Browsing UMBC Information Systems Department by Title
Now showing items 1-20 of 304
-
AARPA: Combining Mobile and Power-line Sensing for Fine-grained Appliance Usage and Energy Monitoring
(IEEE, 2015-09-14)To promote energy-efficient operations in residential and office buildings, non-intrusive load monitoring (NILM) techniques have been proposed to infer the fine-grained power consumption and usage patterns of appliances ... -
Accelerated AI for Edge Computing
(2020-02-25) -
Active Learning Enabled Activity Recognition
(IEEE, 2016-04-21)Activity recognition in smart environment has been investigated rigorously in recent years. Researchers are enhancing the underlying activity discovery and recognition process by adding various dimensions and functionalities. ... -
An Adaptive DPPM for Efficient and Robust Visible Light Communication Across the Air-Water Interface
(IEEE, 2020-05-02)The scarcity of the optical power is the main challenge for underwater visible light communication. It becomes worst for communication across the air-water interface because of the reflection of light from the air-water ... -
Affinity Propagation Initialisation Based Proximity Clustering For Labeling in Natural Language Based Big Data Systems
(IEEE, 2020-06-23)A key challenge for natural language based large text data is automatically extracting knowledge, in terms of entities and relations, embedded in it. State of the art relation extraction systems requires large amounts of ... -
The Aging of a Clinical Information System
(Elsevier, 2004-07-30)The senescence of a clinical information system is more likely to have administrative than technical bases. Supporting this claim is a case study of one aging oncology information system. The case study is qualitative, as ... -
ALDA : Cognitive Assistant for Legal Document Analytics
(Association for the Advancement of Artificial Intelligence, 2016-09-18)In recent times, there has been an exponential growth in digitization of legal documents such as case records, contracts, terms of services, regulations, privacy documents and compliance guidelines. Courts have been ... -
All situational impairments are not created equal: A classification system for situational impairment events and the unique nature of severely constraining situational impairments
(iConference, 2017-07-27)This study explores situationally induced impairments and disabilities (SIIDs) from a unique perspective. A two-week diary study of mobile technology users was conducted to create a corpus of situational impairment events ... -
Analysis and Prediction of 911 Calls based on Location using Spark Big Data Platform
(UMBC, 2019)Proper management of critical resources like Police Force and Ambulance Services is the key to establish peace quickly in times of crisis. When a police district receives a 911 call, quick response can be the difference ... -
Analysis of Data Mining Algorithms
(1997-03-30)A comparative study of algorithms used in Data Mining. This paper was written as part of the MS course work for Advanced Algorithms. -
Analyzing False Positive Source Code Vulnerabilities Using Static Analysis Tools
(IEEE, 2019-01-24)Static source code analysis for the detection of vulnerabilities may generate a huge amount of results making it difficult to manually verify all of them. In addition, static code analysis yields a large number of false ... -
Analyzing Social Media Texts and Images to Assess the Impact of Flash Floods in Cities
(IEEE, 2017-06-15)Computer Vision and Image Processing are emerging research paradigms. The increasing popularity of social media, micro- blogging services and ubiquitous availability of high-resolution smartphone cameras with pervasive ... -
Analyzing the Sentiment of Crowd for Improving the Emergency Response Services
(IEEE, 2018-07-31)Twitter is an extremely popular micro-blogging social platform with millions of users, generating thousands of tweets per second. The huge amount of Twitter data inspire the researchers to explore the trending topics, event ... -
Anomaly Detection Models for Smart Home Security
(IEEE, 2019-08-29)Recent years have seen significant growth in the adoption of smart homes devices. These devices provide convenience, security, and energy efficiency to users. For example, smart security cameras can detect unauthorized ... -
Anomaly Detection: Under the [data] hood in Smart Cars
(IEEE, 2019-08-01)This research focuses on discovering baseline models for driving behavior and vehicle functioning from data in smart cars. This facilitates detection of anomalous behaviors that deviate from such baselines. Human behavioral ... -
Applying Information Technology to Financial Statement Analysis for Market Capitalization Prediction
(Scientific Research Publishing, 2013-01)Determining which attributes may be employed for predicting the market capitalization of a business firm is a challenging task which may benefit from research intersecting principles of accounting and finance with information ... -
Approach for Discovering and Handling Crisis in a Service-Oriented Environment
(IEEE, 2007-06-25)In an emergency situation failure to respond in a timely manner poses a significant threat. Data needed for timely response comes from various sources and sensors. These individual data streams when viewed in isolation may ... -
Assessing Water Budget Sensitivity to Precipitation Forcing Errors in Potomac River Basin Using the VIC Hydrologic Model CyberTraining: Big Data + High-Performance Computing + Atmospheric Sciences
(2019)The Potomac River Basin is a watershed located on the East Coast of the USA across West Virginia, Virginia, Pennsylvania, Maryland, and the District of Columbia. Inter-annual variations in precipitation makes it challenging ... -
Assistive Multimodal Interfaces for Improving Web Accessibility
Multimodal interfaces have been used in helping blind and partially sighted people to access visualization tools such as graphs and numerical tables. However, few studies have been undertaken to improve Web access and ... -
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
(IEEE, 2018-09-10)Medical organizations find it challenging to adopt cloud-based electronic medical records services, due to the risk of data breaches and the resulting compromise of patient data. Existing authorization models follow a ...