Browsing UMBC Information Systems Department by Title
Now showing items 64-83 of 304
-
DeActive: Scaling Activity Recognition with Active Deep Learning
(ACM, 2018)Deep learning architectures have been applied increasingly in multi-modal problems which has empowered a large number of application domains needing much less human supervision in the process. As unlabeled data are abundant ... -
Deep Ice Layer Tracking and Thickness Estimation using Fully Convolutional Networks
(2020-09-01)Global warming is rapidly reducing glaciers and ice sheets across the world. Real time assessment of this reduction is required so as to monitor its global climatic impact. In this paper, we introduce a novel way of ... -
A Deep Learning Approach to Understanding Cloud Service Level Agreements
(2017-05-24)Educational organizations, like Universities and School Systems, are rapidly adopting Cloud based services to provide Information Technology (IT) infrastructure to their students. These include course offerings, class ... -
Deep Learning Based Mineral Dust Detection and Feature Selection
Dust storm affects human health and the environment. In this study, we develop deep learning models to identify dust from cloud and surface using MODIS observations and CALIPSO data. We also identified the best subset of ... -
A Deep Learning Model for Detecting Dust in Earth's Atmosphere from Satellite Remote Sensing Data
(IEEE, 2020-11-06)In this paper we develop a deep learning model to distinguish dust from cloud and surface using satellite remote sensing image data. The occurrence of dust storms is increasing along with global climate change, especially ... -
Deep multi-scale learning for automatic tracking of internal layers of ice in radar data
(Cambridge University Press, 2020-10-12)In this study, our goal is to track internal ice layers on the Snow Radar data collected by NASA Operation IceBridge. We examine the application of deep learning methods on radar data gathered from polar regions. Artificial ... -
Delegated Authorization Framework for EHR Services using Attribute Based Encryption
(IEEE, 2019-05-20)Medical organizations find it challenging to adopt cloud-based Electronic Health Records (EHR) services due to the risk of data breaches and the resulting compromise of patient data. Existing authorization models follow a ... -
Demo Abstract: A Microphone Sensor based System for Green Building Applications
(IEEE, 2015-06-29)Acoustic sensing has influenced many applications in green building energy management, such as designing multi-modal energy disaggregation algorithms through fine-grained appliance state identifications or efficiently ... -
Demo Abstract: ByzGame, a Visualized and Understandable BFT Consensus
(Association for Computing Machinery, 2019-12-09)Byzantine Fault Tolerance (BFT) is the only generic technique that tolerates arbitrary failures in distributed systems, and can be used as a core primitive in building consensus in blockchains. Numerous BFT protocols have ... -
Demo Abstract: Performance of the Latest Generation Powerline Networking for Green Building Applications
(ACM New York, 2013-11-11)Green building applications need to efficiently communicate fine-grained power consumption patterns of a wide variety of consumer-grade appliances for an effective adaptation and percolation of demand response models down ... -
Design & Emotion
(Blogger, 2014-10-21) -
Design of a Tactile Aid for Non-Observable Mobile Authentication to Address Observation Attacks
(2017)Shoulder surfing remains a liability to the security of private data on mobile phones, even as secondary biometric authentication becomes more commonplace. Mobile users in public or shared spaces may therefore shield their ... -
Designing Mobile Interaction Guidelines to Account for Situationally Induced Impairments and Disabilities (SIID) and Severely Constraining Situational Impairments (SCSI)
(2019-04-12)This research investigates the variety and complexity of situational impairment events (SIE) that are being experienced by users of smartphone technology of all abilities. The authors have created a classification system ... -
DETERMINING THE ACCESSIBILITY OF MOBILE SCREEN READERS FOR BLIND USERS
As mobile interfaces are often designed with sighted users in mind, difficulties can be experienced by individualswho are blind, when using a mobile screen reader to access content. In this paper, we describe a data gathering ... -
Determining the Accessibility of Social Networking Websites
Social networking web sites have achieved phenomenal growth within a short period of time. While many of us have accounts to maintain contact with friends and family, social networking sites are also used for purposes of ... -
Determining value co-creation opportunity in B2B services
(IEEE, 2011-03-30)In Business to Business (B2B) IT outsourcing contracts service providers have to demonstrate value continuously to retain client loyalty. However, sustained value can only be co-created by both service providers and clients ... -
A Deterministic Self-Organizing Map Approach and its Application on Satellite Data based Cloud Type Classification
(2018-10-31)A self-organizing map (SOM) is a type of competitive artificial neural network, which projects the high dimensional input space of the training samples into a low dimensional space with the topology relations preserved. ... -
DEVELOPING AN EXTENSION TO AN EXISTING TACTILE AUTHENTICATION MECHANISM TO SUPPORT NON-VISUAL INTERACTION
Authentication mechanisms are often developed without taking into account the needs of users with visual disabilities. In this paper, we describe an extension to an existing tactile authentication system, with the aim of ... -
Developing an Interface to Support Procedural Memory Training using a Participatory–Based Approach
(Science Open, 2012-09-12)For some individuals with executive function deficits, difficulties may be experienced when executing step-by-step procedures involving cognitive and motor skills. In this paper, we describe the design of a mobile application ... -
Developing and evaluating a gestural and tactile mobile interface to support user authentication
(IDEALS, University of Illinois, 2016-03-08)As awareness grows surrounding the importance of protecting sensitive data, stored on or accessed through a mobile device, a need has been identified to develop authentication schemes which better match the needs of users, ...