Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Musa, Sarhan M.
- Identity Theft
Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 422-424Abstract
Identity theft (IT) occurs when someone uses your sensitive personal information without your consent. The personal information may include name, date of birth, address, social security number, mother's maiden name, bank account number, credit card number, phone number, driver's license number, state ID number, or email password. Identity theft has become a major area of public concern and a growing problem throughout the world. No one is safe from becoming its victim. The paper provides a brief introduction to IT.Keywords
Identity Theft, Identity Fraud, Internet Fraud, Cybercrime.References
- i. H. Berghel, “Identity theft and financial fraud: some strangeness in the proportions,” Computer, January 2012, pp.86-89.
- ii. B. W. Reyns, “ Online routines and identity theft victimization: further expanding routine activity theory beyond direct-contact offenses,” Journal of Research in Crime and Delinquency, vol. 50, no. 2, 2013, pp. 216-238.
- iii. A. Awasthi, “Reducing identity theft using one-time passwords and SMS,” The EDP Audit, Control, and Security Newsletter (EDPACS), vol. 52, no. 5, 2015, pp. 9-19.
- iv. N. L. Piquero , M. A. Cohen, and A. R. Piquero, “How much is the public willing to pay to be protected from identity theft?” Justice Quarterly, vol. 28, no. 3, 2011, pp. 437-459.
- v. G. Kołaczek, “An approach to identity theft detection using social network analysis,” Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009, pp. 78-81.
- vi. J. Whitson, “Identity theft and the challenges of caring for your virtual self,” Interactions, vol. 16, no. 2, March/April 2009, pp. 41-45.
- vii. R. Haygood and R. Hensley, “Preventing identity theft: new legal obligations for businesses,” Employment Relations Today, Autumn 2006, pp.71-83.
- viii. W. I. Wang, Y. Yuan, and N. Archer, ”A contextual framework for combating identity theft,” IEEE Security & Privacy, March/April 2006, pp. 30-38.
- a. D. J. Solove, “Identity theft, privacy, and the architecture of vulnerability,” Hastings Law Journal, vol. 54, 2003, pp. 1227-1276.
- Online Laboratory
Abstract Views :173 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 425-426Abstract
The online laboratory offers a convenient, less expensive, and more efficient means of providing laboratory experiments to students using the Internet. The experiments can be accessed anytime and anywhere with limited access to a traditional campus setting. However, online laboratory presents educators with a host of new challenges. This paper presents a brief introduction and challenges of online experimentation.Keywords
Online Laboratory, Virtual Lab, Remote Lab, Online Experiments.References
- i. S. B. B Kanmani and M. Soni, “Online courseware for electronics laboratory courses: An example,” Proceedings of the IEEE International Conference on MOOC, Innovation and Technology in Education (MITE), 2014, pp. 372-376.
- ii. Maiti and B. Tripathy, “Remote laboratories: design of experiments and their Web implementation,” Educational Technology & Society, vol. 16, no. 3, 2013, pp. 220–233.
- iii. M. Rabek and K. Zakova, “Simple experiment integration into modular online laboratory environment,” Proceedings of the 4th Experiment@ International Conference, June 2017, pp. 264-268.
- iv. Maiti, “NETLab: An online laboratory management system,” Proceedings o IEEE EDUCON Education Engineering – The Future of Global Learning Engineering Education, 2010, pp. 1351-1357.
- v. Deaky, “Contribution to Online Laboratory Implementation and Standardization,” Proceedings of the IEEE Global Engineering Education Conference (EDUCON), 2013, pp. 1342-1346.
- Computational Physics : An Introduction
Abstract Views :184 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 427-428Abstract
Computers are playing an increasingly important role in the lives and education of physicists. Several areas in physics have problems which cannot be treated exactly or analytically and must be solved numerically. Computational physics allows developing models of physical phenomena and understanding things at depths greater than possible otherwise. It enables learning physics with computers. This paper provides a brief introduction to computational physics.Keywords
Computational Physics, Computer Experiment, Numerical Experiment.References
- i. L. N. Shchur, “Computational physics and testing theoretical predictions,” Uspekhi Fizicheskikh Nauk, vol. 182, no. 7, 2012, pp. 733-738.“Computational physics,” Wikipedia, the free encyclopedia, https://en.wikipedia.org/wiki/Computational_physics M. N. O. Sadiku, Computational Electromagnetics with MATLAB. Boca Raton, FL: CRC Press, 4th ed., 2018.
- ii. R. H. Landau and M. J. Paez, Computational Physics: Problem Solving with Computers. New York: John Wiley & Sons, 1997.
- iii. A. Prosperetti and G. Tryggvason, “Appendix 3: Report of study group on computational physics,” International Journal of Multiphase Flow, vol. 29, 2003, pp. 1089–1099.
- iv. R. Fitzpatrick, Computational Physics. CreateSpace Independent Publishing Platform, 2015, pp. 7-12.
- v. R. F. Martin, “Undergraduate computational physics education: uneven history and promising future,” Computing in Science & Engineering, March/April 2017, pp.70-78.
- vi. K. R. Roos, ”An incremental approach to computational physics education,” Computing in Science & Engineering, September/October 2006, pp. 44-50.
- vii. L. Andrasik, "Computational qualitative economics–using computational intelligence for advanced learning of economics in knowledge society," Creative and Knowledge Society, vol. 5, no. 2, 2015, pp. 1-15.
- viii. R. H. Landau, “Computational physics for undergraduates,” Computing in Science & Engineering, March/April 2004, pp. 68-75.
- Mobile Internet
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 429-430Abstract
Mobile Internet refers to accessing the Internet with handheld mobile devices through wireless communication infrastructures. It provides mobile platform for mobile commerce, entertainment, and online learning. The mobile Internet market is growing rapidly due to the increasing demand for mobile phones. Many forecasters suggest that in the near future most Internet access will take place using always-on mobile devices. This paper provides a brief introduction to mobile Internet.Keywords
Mobile Internet, m-Internet, Wireless Internet, Internet Access.References
- i. D. Ma et al., “Factors enabling the use of mobile Internet services by information disadvantaged people,” Proceedings of the First IEEE International Conference on Computer Communication and the Internet, 2016, pp. 28-31.
- ii. H. Y. Wang et al., “Gender activities in mobile Internet,” Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, June 2010, pp. 1282-1284.
- iii. R. Staton, “The mobile Internet: What is it? How will it be built? And what services will it deliver?” International Review of Law Computers & Technology, vol. 15, no. 1, 2001, pp. 59-71.
- iv. J. Montavont, D. Roth, and T. Noel, “Mobile IPv6 in Internet of Things: analysis, experimentations and optimization,” Ad Hoc Networks, vol. 14, 2014, pp. 15-25.
- v. M.N.O. Sadiku, and S.M. Musa and S. R. Nelatury, “Internet of Things: an introduction,” International Journal of Engineering Research and Advanced Technology, vol. 2, no.3, March 2016, pp. 39-43.
- vi. T. Yoong-En and D. S. K. Seong, “Visual history mechanism on mobile Internet browser,” Proceedings of the 4th International Conference on Mobile Technology, Applications and Systems, 2007, pp. 372-379.
- vii. G. Buchanan et al., “Improving mobile Internet usability,” Proceedings of the 10th International Conference on World Wide Web, March 2001, pp. 673-680.
- viii. O. Pitkanen et al., “Assessing legal challenges on the mobile Internet,” International Journal of Electronic Commerce, vol. 8, no. 1, 2003, pp. 101-120.
- Internet Addiction
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 9 (2017), Pagination: 431-432Abstract
The Internet is one of the most widely used media in modern society. However, it has great potential to affect the emotions of humans and anxiety levels. Internet addicts suffer from emotional problems such as depression and anxiety-related disorders. Some of them are also addicted to alcohol, drugs, tobacco, or sex. Young adults between the ages of 18-29 are considered as the most preoccupied population with Internet. Internet addiction is a medically recognized disorder. This paper provides a brief introduction to Internet addiction.Keywords
Internet Addiction, Problematic Internet Use, Internet Addiction Disorder, Internet Dependence.References
- i. C. Randler, M. B. Horzum, and C. Vollmer, “Internet addiction and its relationship to chronotype and personality in a Turkish university student sample,” Social Science Computer Review, vol. 32, no. 4, 2014, pp. 484-495.
- ii. ”Internet addiction disorder,” Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Internet_addiction_disorder
- iii. F. Saliceti, “Internet addiction disorder (IAD),” Procedia - Social and Behavioral Sciences, vol. 191, 2015, pp. 1372 – 1376.
- iv. K. S. Young, “Internet sex addiction risk factors, stages of development, and treatment,” American Behavioral Scientist, vol. 52, no.1, September 2008, pp. 21-37.
- v. F. Khazaei, O. Khazaei, and B. Ghanbari-H, “Positive psychology interventions for Internet addiction treatment,” Computers in Human Behavior , vol. 72, 2017, pp. 304-311.
- vi. K. S. Young, “The evolution of Internet addiction,” Addictive Behaviors, vol. 64, 2017, pp. 229–230.
- vii. “Resources for Internet Addiction,” IEEE Technology and Society Magazine, December 2016, pp. 16.
- Computational Electromagnetics
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 8 (2017), Pagination: 414-416Abstract
Computational electromagnetic (CEM) involves using numerical methods to solve real-life electromagnetic problems. Over the years, a great number of CEM tools have been developed to simulate and to analyze electromagnetic systems. This has been made possible due to the numerous contributions from several institutions, universities, and industries around the world. This paper provides a brief introduction to CEM.Keywords
Computational Electromagnetic, Numerical Electromagnetic.- Named Data Networking
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
1 Department of Electrical & Computer Engineering, Prairie View A&M University, Prairie View, TX 77446, US
2 Department of Engineering Technology, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 7 (2017), Pagination: 371-372Abstract
To cope with today's communication needs, named data networking (NDN) has been introduced as a promising candidate for the future Internet. NDN is a new architecture, which is compatible with today's Internet. The elegance of its architecture and its adequateness to today's Internet usage make it a good candidate for the next generation of networks. This paper provides a brief introduction to NDN.Keywords
Named Data Networking, Content-Centric Networking, Content-Based Networking, Data-Oriented Networking, Information-Centric Networking.- Crowd Sourcing:A Primer
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 12 (2017), Pagination: 529-530Abstract
Crowd sourcing is the process of getting work done by online community or crowd of people in the form of an open call, the voluntary undertaking of a task. It allows businesses and organizations to use multiple sources to develop solutions for their problems. Users can participate remotely from anywhere in the world by using their own devices and perform tasks in exchange for monetary rewards. The underlying principle of crowd sourcing is that more heads are better than one. This paper provides a brief introduction to crowd sourcing--what it does, how it works, and its limitations.Keywords
Crowd Sourcing, Crowd Wisdom, Crowd Creation, Crowd Funding, Crowd Democracy.References
- i. “Crowdsourcing,” Wikipedia, the free encyclopedia, https://en.wikipedia.org/wiki/Crowdsourcing
- ii. G. Chatzimilioudis et al., “Crowdsourcing with smartphones,” IEEE Internet Computing, September/October, 2012, pp. 36-44.
- iii. D. C. Brabham, “Crowdsourcing as a model for problem solving: An introduction and cases,” Convergence: The International Journal of Research into New Media Technologies, vol. 14, no. 1, 2008, pp. 75-90.
- iv. “List of crowdsourcing projects,” Wikipedia, the free encyclopedia, https://en.wikipedia.org/wiki/List_of_crowdsourcing_projects
- v. A. Doan et al., “Crowdsourcing applications and platforms: Data management perspective,” Proceedings of the VLDB Endowment, vol. 4, no. 12, 2011, pp. 1508-1509.
- vi. S. Shafiee, H. Shafiee, and F. Mortazavi, “Security of Crowd Sourcing,” Proceedings of the 10th International Conference on e-Commerce with a Focus on Tourism, April 2016, pp. 1-6.
- vii. P. Whitla, “Crowdsourcing and its application in marketing activities,”.
- viii. Contemporary Management Research, vol. 5, no. 1, March 2009, pp. 15-28.
- ix. P. Dutil, “Crowdsourcing as a new instrument in the government’s arsenal: Explorations and considerations,” Canadian Public Administration, vol. 58, no. 3, Sept. 2015, pp. 363-383.
- x. S. Greengard, “Following the Crowd,” Communications of the ACM, vol. 54, no. 2, February 2011, pp. 20-22.
- Web Computing:An Introduction
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 12 (2017), Pagination: 531-532Abstract
Web computing is computing enabled by and situated on the web. It involves accessing a machine that is somewhere connected to the Internet to process some data and obtain results. It is based on a client/server model. The main objective of web computing is to perform CPU intensive tasks by outsourcing the computations to external clients. This paper provides a brief introduction to web computing.Keywords
Web Computing, Web-Based Computing.References
- i. A. L. Rosenberg, “Accountable web-computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 2, February 2003, pp. 97-106.
- ii. N. B. Serbedzija, “Web computing in theory and practice: an introduction to the Minitrack,” Proceedings of the Thirty-First Hawaii International Conference on System Sciences, January 1998, pp. 602-603.
- iii. H. Shen, Z. Yang, and C. Sun, “Collaborative web computing: from desktops to webtops,” IEEE Distributed Systems Online, vol. 8, no. 4, April 2007, pp. 1-4.
- iv. N. B. Serbedzija, “Web computing framework,” Journal of Systems Architecture, vol. 45, 1999, pp. 1293-1306.
- v. I. Hababeh, I. Khalil, and A. Khreishah, “Designing high performance web-based computing services to promote telemedicine database management system,” IEEE Transactions on Services Computing, vol. 8, no. 1, Jan/Feb. 2015, pp. 47-64.
- vi. S. R. Wilkinson, “Web computing for bioinformatics applications,” Doctoral Dissertation, University of Alabama at Birmingham, 2015.
- vii. S. Wong, “An authentication protocol in web-computing,” Proceedings of 20th IEEE International Parallel & Distributed Processing Symposium, 2006.
- viii. C. J. Romanowski, R. K. Raj, and M. Kwon, “Work on progress - An immersion course concentration in mobile web computing,” Proceedings of 41st ASEE/IEEE Frontiers in Education Conference, Rapid City, SD, October, 2011.
- Surveillance Networks
Abstract Views :154 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX 77446, US
Source
International Journal of Engineering Research, Vol 6, No 11 (2017), Pagination: 453-454Abstract
Surveillance networks have increased in popularity the last decades as safety and security have become critical issues in many infrastructures such as power stations, airports, hospitals, and schools. They are to provide protection from a wide range of threats or attacks and serve as a deterrent to crime. This paper provides a brief introduction to surveillance networks, their applications, and challenges.Keywords
Surveillance Network, Computer Surveillance, Sensor Network.- Computational Economics
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
1 Roy G. Perry College of Engineering, Prairie View A&M University, Prairie View, TX-77446, US
Source
International Journal of Engineering Research, Vol 6, No 11 (2017), Pagination: 464-465Abstract
The recent advances in modeling tools have greatly expanded the possibility set for economists. This has led to the rapid emergence of computational economics as an independent branch in economics. Computational economics is a multidisciplinary field that explores the interaction of economics and computational systems. It has added a new dimension to microelectronics. This paper provides a brief introduction to computational economics.Keywords
Computational Economics, Agent-Based Computational Economics.- Wearable Computing
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Prairie View A&M University, Prairie View, TX-77446, US
1 Prairie View A&M University, Prairie View, TX-77446, US
Source
International Journal of Engineering Research, Vol 6, No 10 (2017), Pagination: 445-447Abstract
Wearable computers are computer devices or systems integrated into the clothing or attached to the body of a person. The evolution of wearable computing devices, driven by the confluence of information and communication technology, has changed the way people use online services by keeping them always connected. This paper provides a brief introduction to wearable computing with its technical issues and challenges that must be addressed to reap the huge benefits.Keywords
Wearable Computing, Wearables, Wearable Technology, Body-Borne Computing.- Information Engineering
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
Source
International Journal of Engineering Research, Vol 6, No 10 (2017), Pagination: 448-449Abstract
Being in the age of information, we are bombarded with large volumes and diverse types of information. Information engineering is a family of data-oriented analysis and techniques used to design, develop, and maintain information systems which support strategic missions, decision processes, and daily operations of a company. It is often regarded as a data-oriented methodology rather than a process-oriented methodology. This paper provides a brief introduction to information engineering.Keywords
Information Engineering, Social Information Engineering, Information Integration.- Mobile Health
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US
1 Department of Electrical/Computer Engineering, Prairie View A&M University, US
2 Engineering Technology, Prairie View A&M University, US