3225 Chapters
  Title Author Publisher Format Buy Remix
Medium 9781601323170

Web-Based Database Project for the Lawton, OK Police Department: Interdisciplinary Systems Software Development at Cameron University

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

350

Int'l Conf. Frontiers in Education: CS and CE | FECS'14 |

Web-Based Database Project for the Lawton, OK Police Department:

Interdisciplinary Systems Software Development at Cameron University

K. David Smith, Chao Zhao, Mike Estep, Abbas Johari

Computing & Technology Department, Cameron University, Lawton, OK, USA

William Carney

English Department, Cameron University, Lawton, OK, USA

Abstract – Teaching systems software engineering to undergraduates can be a challenging task. Cameron

University offers a unique interdisciplinary research and production experience for its senior Computer Science,

Multimedia, Information Technology, and English majors.

This capstone course provides students the opportunity to complete a comprehensive software project working for an actual client, and affords students the opportunity to practice real-life research and professional skills in a setting with multiple feedback opportunities. The client for the Spring

2013 course was the City of Lawton, OK, Police Department

See All Chapters
Medium 9781683921943

Image Processing + Feature Extraction and Classification + Tools and Datasets + Applications

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'17 |

SESSION

IMAGE PROCESSING + FEATURE EXTRACTION

AND CLASSIFICATION + TOOLS AND DATASETS

+ APPLICATIONS

Chair(s)

TBA

ISBN: 1-60132-464-2, CSREA Press ©

109

110

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'17 |

ISBN: 1-60132-464-2, CSREA Press ©

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'17 |

111

Multi-level Fusion Scheme for Target Classification using

Camera and Radar Sensors

Eugin Hyun1) and Young-Seok Jin

ART (Advanced Radar Technology) Lab., Convergence Research Center for Future Automotive Technology,

DGIST (Daegu Gyeongbuk Institute of Science & Technology), Daegu, South Korea.

1) braham@dgist.ac.kr (corresponding author)

Abstract - We propose a multi-level fusion scheme for target detection using camera and radar sensors. For the proposed scheme, the radar sensor provides the target track information of the range, velocity, angle, and track ID. This data is applied during the vision processing step as the ROI

See All Chapters
Medium 9780874217506

Chapter 1 - Digitizing and Virtualizing Folklore

Trevor J. Blank Utah State University Press ePub

SIMON J. BRONNER

One popular sense of tradition signals a human, even naturalistic connection. In this view, tradition is down home, out in the fields, back in the woods, where socializing, ritualizing, and storytelling occur unencumbered by machines or corporations. Hearing tradition uttered often raises images of family huddled around the dinner table at holidays or the neighborhood gang getting together for play, and it might be imaginatively set in opposition to the socially alienating quality of modernity dominated by technology. The rhetoric of tradition cited in folkloristic annals is not that far off from these characterizations, although it may broaden toa variety of settings—urban as well as rural, industrial as well as agricultural—and include folk transmission via a host of technologies, from printing press to photocopier (Bendix 1997; Bronner 1998).Still, analytical uses of tradition typically evoke a community’s naturally authentic customs or face-to-face expressive encounters, in contrast to the artificiality of technology. The folklorist’s tradition signifies cultural production of earthy artistic expressions, from homey proverbs to handwrought pots, which are said to be folk because they attach culturally to groups and repeat and vary. To be sure, the joke of the day or the latest rumor on the Internet may be pegged as lore or urban legend, but it is hard to shake the image of folk connections made around the campfire rather than through FireWire.

See All Chapters
Medium 9789351382669

Papers

Ajay Raj Parashar, Deepti Mittal Laxmi Publications PDF

Papers

2003-04

Cryptography and Network Security

Note:

(i) Attempt all questions.

(ii) Choices are given in each question set.

(iii) In case of numerical problem assume data whenever not provided.

(iv) Be precise in your answer.

1. Attempt any four of the following questions:

(5 × 4 = 20)

(a) Explain Feistel Encryption and Decryption Algorithm. What is the difference between diffusion and confusion.

(b) What is triple DES? Explain the term meet in middle attack.

(c) What is a key Distribution center? List the ways in which secret keys can be distributed to two communicating partners. Differentiate between session key and master key.

(d) What is transposition cipher? Illustrate an example. What is steganography?

(e) What is the difference between a block cipher and a stream cipher? Explain the term, one time pad.

(j) Explain random number generation techniques.

2. Attempt any four of the following questions:

(5 × 4 = 20)

(a) Briefly define a Group, Ring and Field.

(b) Determine gcd(1970, 1066).

See All Chapters
Medium 9781601323248

Invariant Feature Extraction using 3D Silhouette Modeling

Hamid R. Arabnia, Leonidas Deligiannidis Joan Lu, Fernando G. Tinetti, Jane You, George Jandieri, Gerald Schaefer, and Ashu M.G. Solo CSREA Press PDF

Int'l Conf. IP, Comp. Vision, and Pattern Recognition | IPCV'14 |

151

Invariant Feature Extraction using 3D Silhouette

Modeling

Jaehwan Lee1, Sook Yoon2, and Dong Sun Park3

Department of Electronic Engineering, Chonbuk National University, Korea

2

Department of Multimedia Engineering, Mokpo National University, Korea

3

IT Convergence Research Center, Chonbuk National University,

1

Abstract - One of the major challenging tasks in object recognition results from the great change of object appearance in the process of perspectively projecting objects from 3-dimensional space onto 2-dimensional image plane with different viewpoints. In this paper, we proposed a method to extract features invariant to limited movements of objects by constructing a 3-D model using silhouettes of objects from images with multiple viewpoints. We investigated several renowned invariant features to find the most appropriate one for the proposed method, including SIFT[5], SURF[6],

ORB[7], BRISK[8]. The simulation results shows that all the invariant features tested work well and the SURF performs best in terms of matching accuracy.

See All Chapters
Medium 9781601323606

SESSION Active Learning, E-Learning, Learning Strategies, Collaborative Learning and Tools

Hamid Arabnia, Azita Bahrami, Leonidas Deligiannidis CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'16 |

SESSION

ACTIVE LEARNING, E-LEARNING, LEARNING

STRATEGIES, COLLABORATIVE LEARNING,

AND TOOLS

Chair(s)

TBA

ISBN: 1-60132-435-9, CSREA Press ©

115

116

Int'l Conf. Frontiers in Education: CS and CE | FECS'16 |

ISBN: 1-60132-435-9, CSREA Press ©

Int'l Conf. Frontiers in Education: CS and CE | FECS'16 |

117

Developing Professional Competencies in Soft-Skills in

Information Technology Students: A Tale of Three

Interventions

1

P. Meso1 and D. Kerven1

School of Science and Technology, Georgia Gwinnett College, Lawrenceville, Georgia, USA

Abstract - Imparting professional-grade soft skills in information systems/information technology (hereafter collectively referred to as IT) professionals is an important part of any college IT curriculum. However, this is not an easy feat due to the nature of IT as a subject and the classroom Lecture

See All Chapters
Medium 9781601322401

On the Implementation of one Registration, one Vote in South African Elections

Hamid R. Arabnia; Azita Bahrami; Fernando G. Tinetti; Leonidas Deligiannidis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

184

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

On the Implementation of one Registration, one Vote in South African Elections

Bassey Isong1, Ndwamato Netshipise1, Gilbert Dzawo1 and Munienge Mbodila2

Department of Computer Science & Information Systems, University of Venda, Thohoyandou, South Africa

2

Science Foundation - Computer Science Unit, University of Venda, Thohoyandou, South Africa

1

Abstract - In any democratic setting, having regular free and fair elections is very critical to the stability of the nation as building trust and confidence is to promoting citizen’s participation. In South Africa (SA) elections, though free and fair as seen, technically the system does not guarantee one man with one registration and one vote. Consequently, voter’s fraud are not exception, though remains “closed”. The system needs to be improved in order to protect the integrity of the elections. Therefore, the objective of this paper is to implement a new approach for SA elections based on realtime voter registration and identification. As part of the implementation, a novel system prototype called VOTEX

See All Chapters
Medium 9781601324146

Green Networks and Energy Efficient Systems: Methods and Power Aware Systems

Hamid R. Arabnia, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, Fernando G. Tinetti (Editors) CSREA Press PDF

Int'l Conf. Wireless Networks | ICWN'15 |

227

A Survey of Base Station Sleeping Technologies for Green

Cellular Networks

Mwashita Weston 1, Odhiambo Marcel Ohanga2

College of Science, Engineering and Technology, University of South Africa, PO Box 5172 Windhoek,

Namibia

2

Department of Process Control and Computer Systems, Faculty of Engineering and Technology

Vaal University of Technology, Private Bag X021 Vanderbijlpark,1911, Andries, Portgieter, South Africa

1

Abstract - This paper presents a survey of the latest technologies that have been advanced by both academia and industry in an attempt to reduce the energy consumed by

Base stations (BS) in cellular networks. Since BSs are the primary energy consumers in cellular networks, BS sleeping technologies are promising proposals in reducing BS energy consumption. The main goal of the survey is to gain an indepth understanding of the benefits and shortcomings of these proposed technologies. The survey presented the authors with an opportunity to offer clear insights to researchers working on Green Cellular Networks for them to choose and adapt the most efficient ways of reducing BS energy consumption without compromising Quality of Service

See All Chapters
Medium 9781601323170

Increasing Diversity in Engineering, IT, and Computer Science

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'14 |

277

Increasing Diversity in Engineering, IT, and Computer

Science

M. Barjaktarovic

Department of Computer Science, Hawai’i Pacific University, Honolulu, Hawai’i, U.S.A.

Abstract – There is an interest in increasing diversity in traditionally very homogeneous and rather closed professions of engineering, IT, and computer science. The National

Science Foundation (NSF), government, corporations, as well as institutions of higher learning all have this issue on their agenda, for various and differing reasons. Although many efforts have been made over the years, these professions are still not diverse enough and numbers of some minorities have even decreased. In this paper we discuss some of the potential barriers to diversity and our approach to overcome them as a female faculty member in a computer science department.

Strategies, pitfalls, and successes are presented.

Keywords: diversity, minority, engineering, IT, computer, science

1

Introduction

See All Chapters
Medium 9781601323545

SESSION Systems Biology and RNA Sequence Data Processing + High Performance Computing

Hamid Arabnia, Fernando G. Tinetti, Quoc-Nam Tran CSREA Press PDF

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'16 |

SESSION

SYSTEMS BIOLOGY AND RNA SEQUENCE DATA

PROCESSING + HIGH PERFORMANCE

COMPUTING

Chair(s)

TBA

ISBN: 1-60132-428-6, CSREA Press ©

95

96

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'16 |

ISBN: 1-60132-428-6, CSREA Press ©

Int'l Conf. Bioinformatics and Computational Biology | BIOCOMP'16 |

97

Stage-specific transcriptome of the malaria parasite in the red blood cell cycle

Hao Zhang1, Timothy G. Lilburn2,Hong Cai,1, Yufeng Wang 1, 3*

Department of Biology, University of Texas at San Antonio (UTSA), San Antonio, TX 78249, USA.

2

Novozymes NA, Durham, NC 27709, USA.

3

South Texas Center for Emerging Infectious Diseases, UTSA, TX 78249, USA

Email addresses: HZ: hao.zhang@utsa.edu, TGL: TLR@novozymes.com, HC: hong.cai@utsa.edu, YW: yufeng.wang@utsa.edu, * Corresponding author

See All Chapters
Medium 9788131805220

ALLC7-1

Manish Goyal Laxmi Publications PDF

433

MATRIX INVERSION

Operating R3

FG 11025 IJ

H 64 K

LM

MN

− 15 / 4

1 0 − 3 / 35

9/4

0

− 15 / 4

6/7

45 / 4

0

~ 0 1

0 0

1

945 / 64 − 4725 / 32 11025 / 64

Operating R13

FG 3 IJ , R FG − 6 IJ

H 35 K H 7 K

L1 0

~ M0 1

MN0 0

OP

PQ

23

A–1 =

OP

PQ

− 525 / 32

0 225 / 64

945 / 64

0 − 525 / 32 2205 / 16 − 4725 / 32 ~ [I : A–1]

1 945 / 64 − 4725 / 32 11025 / 64

LM

MN

225

1

− 1050

64

945

OP

PQ

− 1050

8820

− 9450

945

− 9450 .

11025

ASSIGNMENT

1.

Find the inverse of the following matrices using Gauss-Jordan elimination method.

LM

MN

LM

MN

OP

PQ

1.

(i)

LM

MN

OP

PQ

LM

MN

1 3 3

(ii) 1 4 3

1 3 4

1 1

1

(i) 4 3 − 1

3 5

3

OP

PQ

14

2 −4

1

− 15

0

5

10

11 − 2 − 1

OP

PQ

1 1 2

(iii) 1 2 4 .

2 4 7

Answer

LM

MN

OP

PQ

7 −3 −3

1

0

(ii) − 1

−1

0

1

LM

MN

OP

PQ

2 −1

0

2 .

(iii) − 1 − 3

0

2 −1

7.2. TRIANGULARIZATION METHOD

In this method, we write the given matrix as

A = LU where L is a lower triangular matrix and U is an upper triangular matrix.

The inverse of A can be determined as

A–1 = U–1 L–1

If lii = 1, the method is called Doolittle’s method.

If uii = 1, the method is called Crout’s method.

EXAMPLES

Example 1. Given the matrix A =

See All Chapters
Medium 9781601323705

SESSION Process and Product Line Improvement + Agile Development and Management

Hamid Arabnia, Leonidas DeligiannidisFernando G. Tinetti CSREA Press PDF

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

SESSION

PROCESS AND PRODUCT LINE IMPROVEMENT

+ AGILE DEVELOPMENT AND MANAGEMENT

Chair(s)

TBA

ISBN: 1-60132-446-4, CSREA Press ©

69

70

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

ISBN: 1-60132-446-4, CSREA Press ©

Int'l Conf. Software Eng. Research and Practice | SERP'16 |

71

Development of a System for Monitoring and Controlling

Research Projects based on a Framework Integrating

Traditional and Agile Methodologies

C. Gutiérrez1, S. Díaz1, J. De La Rosa1, K. Gómez1, C. Baron2, I. Reyes1, and M. Villanueva1

Departamento de Ingenierías, Instituto Tecnológico de Toluca, Metepec, Edo. de México, México

2

LAAS-CNRS, Université de Toulouse, CNRS, INSA, UPS, Toulouse, France.

1

Abstract – The information systems used in the educational sector allow the automatization of tasks and processes, the reduction of time and effort, as well as the coordination and management of activities in an efficient manner. This paper presents the analysis, design and development of an information system for the monitoring and control of research projects in the educational sector, and which is based on a framework led by software engineering. An innovative aspect of this research consists of the integration of characteristics to the information system that contribute to the improvement of the education quality since these permit the supervision and control of several aspects. Its impact is reflected in the generation of evidence of the followed process as it complies with some indicators of the Quality Management System.

See All Chapters
Medium 9788131805220

ALLC4-1

Manish Goyal Laxmi Publications PDF

4

Interpolation

4.1. INTRODUCTION

According to Theile, ‘Interpolation is the art of reading between the lines of the table’.

It also means insertion or filling up intermediate terms of the series.

Suppose we are given the following values of y = f(x) for a set of values of x : x :

x0

x1

x2

......

xn

y:

y0

y1

y2

......

yn

Thus the process of finding the value of y corresponding to any value of x = xi between x0 and xn is called interpolation.

Hence interpolation is the technique of estimating the value of a function for any intermediate value of the independent variable while the process of computing the value of the function outside the given range is called extrapolation.

4.2. ASSUMPTIONS FOR INTERPOLATION

1. There are no sudden jumps or falls in the values during the period under consideration.

2. The rise and fall in the values should be uniform. e.g. if we are given data regarding deaths in various years in a particular town and some of the observations are for the years in which epidemic or war overtook the town then interpolation methods are not applicable in such cases.

See All Chapters
Medium 9781601322500

Modified GPSR Protocol using mobility in Wireless Sensor Networks

Hamid R. Arabnia; Victor A. Clincy; Leonidas Deligiannidis; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Wireless Networks | ICWN'13 |

363

Modified GPSR Protocol using mobility in Wireless Sensor Networks

Abdullilah Alotaibi , Abdulaziz Almazyad

Computer Engineering Department,

King Saud University

Email: Abdullilahawad@yahoo.com, Mazyad@KSU.EDU.SA

Abstract

Greedy Perimeter Stateless Routing (GPSR) provides routing support for wireless sensor network (WSN) environment. IP addresses don’t designate the sensor nodes in WSN so, the sensor node is designated by its location. When the receiver is outside the sensing field boundary, GPSR suffers by energy inefficiency because it has to route through all the sensor nodes in the boundary until reach the receiver. The GPSR utilizes a greedy forwarding strategy and perimeter forwarding strategy to route messages to receiver. It uses a neighbourhood message that contains the identity of a sensor node and its location. However, instead of sending this message periodically and the network is congested, GPSR piggybacks the neighbourhood message on each message that is sent or forwarded by the sensor node. GPSR finds a sensor node that is nearer to the receiver than itself and forwards the message to that sensor node. This method fails sometime so, the GPSR presents another method which is called perimeter routing which utilizes the right-hand graph traversal rule.

See All Chapters
Medium 9781601324085

Late Breaking Papers: Security and Management and Cyber Security Education

Kevin Daimi, Hamid R. Arabnia, George Markowsky, Ashu M. G. Solo (Editors) CSREA Press PDF

Int'l Conf. Security and Management | SAM'15 |

355

The Benefits of Hosting the NECCDC at Your Institution

G. Markowsky1 , P. Lutz2 , D. Johnson2

W. Stackpole2 , R. Soucy1 , and B. Attaie3

1 School of Computing and Information Science, University of Maine, Orono, Maine, USA

2 Department of Computing Security, Rochester Institute of Technology, Rochester, NY, USA

3 School of Information Studies,Syracuse University, Syracuse, NY, USA

Abstract— The Northeast Collegiate Cyber Defense Competition (NECCDC) [2] is a regional competition that feeds the National Collegiate Cyber Defense Competition (CCDC)

[1]. Since RIT organized the first NECCDC in 2008, the

NECCDC has selected a representative to compete in the

CCDC. It has been relatively successful and has produced the national champion twice and the runner up three times during its eight years of existence. The NECCDC has been hosted on a rotating basis by one of the universities in the northeast and has become a popular event for both the hosting schools and for the students. We feel that the

See All Chapters

Load more