CEC Faculty Articles

 

A selection of faculty scholarship from the College of Engineering and Computing.

Follow


Submissions from 2012

Link

Writing an applied learning technology proposal, Gertrude W. Abramson

Minimal Dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach, James D. Cannady Jr. and Jean-Pierre Nziga

Link

Computational Predictions of Volatile Anesthetic Interactions with the Microtubule Cytoskeleton: Implications for Side Effects of General Anesthesia, Travis J.A. Craddock, Marc St. George, Holly Freedman, Khaled H. Barakat, Sambasivarao Damaraju, Stuart Hameroff, and Jack A. Tuszynski

Link

An Investigation of the Plausibility of Stochastic Resonance in Tubulin Dimers, Travis J. A. Craddock, Aditya A. Saha, and Jack A. Tuszynski

Link

The Zinc Dyshomeostasis Hypothesis of Alzheimer’s Disease, Travis J.A. Craddock, Jack A. Tuszynski, Deepak Chopra, Noel Casey, Lee E. Goldstein, Stuart R. Hameroff, and Rudolph E. Tanzi

Link

Cytoskeletal Signaling: Is Memory Encoded in Microtubule Lattices by CaMKII Phosphorylation?, Travis J. A. Craddock, Jack A. Tuszynski, and Stuart Hameroff

Link

Modeling the Yew Tree Tubulin and a Comparison of its Interaction with Paclitaxel to Human Tubulin, Travis J. A. Craddock, Jack A. Tuszynski, Jonathan Y. Mane, Khaled Barakat, Chih-Yuan Tseng, Melissa Gajewski, Philip Winter, Laleh Alisaraie, Jordan Patterson, Eric Carpenter, Weiwei Wang, Michael K. Deyholos, Linji Li, Xiao Sun, Yong Zhang, and Gane Ka-Shu Wong

Learning analytics considered harmful, Laurie P. Dringus and Amon B. Seagull

A Research Study for the Development of a SOA Middleware Prototype That Used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education, Timothy J. Ellis and Robert T. Mason

Link

The role of responsibility factors of reducing inefficiencies in IS projects on Six Sigma certification in service organizations, Sara Hejazi and Yair Levy

Link

A study of online exams procrastination using data analytics techniques, Yair Levy and Michelle M. Ramim

Link

Spyware – Risk and Ambiguity Attitudes, Easwar A. Nyshadham, Eric Scott Ackerman, and Vadhindran K. Rao

Parametric Modeling for Estimating Abnormal Intra-QRS Potentials in Signal-Averaged Electrocardiograms: A Subspace Identification Approach, Jose A. Ramos and Paulo Lopes dos Santos

Identification of LPV Systems with Non-White Noise Scheduling Sequences, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, and Jorge L. Martins de Carvalho

Identification of a Benchmark Wiener-Hammerstein: A Bilinear and Hammerstein–Bilinear Model Approach, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho

A Null-Space-Based Technique for the Estimation of Linear-Time Invariant Structured State-Space Representations, Jose A. Ramos, Olivier Prot, and Guillaume Mercere

Link

Equity theory based strategies for students on overcoming problems in Ph.D. dissertation committees, Dara Schniederjans, Marc Schniederjans, and Yair Levy

PDF

Designing an online dissertation research community of practice, Martha M. Snyder, Laurie P. Dringus, and Steven R. Terrell

Mining Attribute Association in Query Predicates for Access Path Generation, Junping Sun

PDF

Mixed-Methods Research Methodologies, Steven R. Terrell

PDF

A Grounded Theory of Connectivity and Persistence in a Limited Residency Doctoral Program, Steven R. Terrell, Martha M. Snyder, Laurie P. Dringus, and Elizabeth Maddrey

Submissions from 2011

Link

From the Desk of the Executive Editor: Academic and Industry Presence, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: In Memoriam: Steve Jobs, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: New Decade, New Journal, New Technology, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: On-Campus, Online and Blended Learning, Gertrude W. Abramson

Hazzan, O., Lapidot, T. & Ragonis, N. (2011). Guide to teaching computer science: An activity-based approach, Gertrude W. Abramson

Link

Reflections on pre-service teacher education, Gertrude W. Abramson

An Adaptive Neural Swarm Approach for Intrusion Defense in Ad Hoc Networks, James D. Cannady Jr.

Link

Online Learning Communities: Enhancing Undergraduate Students' Acquisition of Information Skills, Noraida Dominguez-Flores and Ling Wang

Link

Cognitive and self-selective routing for sensor networks, Erol Gelenbe, Peixiang Liu, Boleslaw K. Szymanski, and Christopher Morrell

A Genetic Algorithm for the Constrained Forest Problem, Michael J. Laszlo and Sumitra Mukherjee

Link

A guide for novice researchers on experimental and quasi-experimental studies in information systems research, Yair Levy and Timothy J. Ellis

Link

Comparing intentions to use university-provided vs. vendor-provided multibiometric authentication in online exams, Yair Levy, Michelle M. Ramim, Steven M. Furnell, and N L. Clarke

Subspace Algorithms for Identifying Separable-in-Denominator Two-Dimensional Systems with Deterministic Inputs, Jose A. Ramos, Ahmed Alenany, H. Shang, and Paulo Lopes dos Santos

Subspace System Identification of Separable-in-Denominator 2-D Stochastic Systems, Jose A. Ramos and Paulo Lopes dos Santos

A Subspace Algorithm for Identifying 2-D CRSD Systems with Deterministic Inputs, Jose A. Ramos, Paulo Lopes dos Santos, Ahmed Alenany, and Helen Shang

Indirect Continuous-Time System Identification - A Subspace Downsampling Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, and Jorge L. Martins de Carvalho

Leakage Detection and Location in Gas Pipelines Through an LPV Identification Approach, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, and Jorge L. Martins de Carvalho

An LPV Modeling and Identification Approach to Leakage Detection in High Pressure Natural Gas Transportation Networks, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Jorge L. Martins de Carvalho, Gerhard Jank, and J. Milhinhos

PDF

Face-to-Face in Writing: My First Attempt at Conducting a Text-based Online Focus Group, Steven R. Terrell

An Approach to Model-Based Development of Secure and Reliable Systems, Michael Van Hilst, Eduardo B. Fernandez, Hironori Washizaki, and Nobukazu Yoshioka

Process Analysis of a Waterfall Project Using Repository Data, Michael Van Hilst, Shihong Huang, and Hugh Lindsay

Measuring Effort in a Corporate Repository, Michael Van Hilst, Shihong Huang, James Mulcahy, Wayne Ballantyne, Ed Suarez-Rivero, and Douglas Harwood

Submissions from 2010

Link

From the Desk of the Executive Editor: Scholars and Friends, Gertrude W. Abramson

Detection of Distributed Attacks in Mobile Ad-Hoc Networks Using Self-Organizing Temporal Neural Networks, James D. Cannady Jr.

Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks, James D. Cannady Jr.

Real-time Detection of Distributed Zero-Day Attacks in Ad Hoc Networks, James D. Cannady Jr.

Automated Detection of Semagram-Laden Images Using Adaptive Neural Networks, James D. Cannady Jr. and Paul S. Cerkez

Not So Fast Flux Networks for Concealing Scam Servers, James D. Cannady Jr. and Theodore O. Cochran

Risk Forecast Using Hidden Markov Models, James D. Cannady Jr. and Charles Pak

Link

"Memory Bytes" - Molecular Match for CaMKII Phosphorylation Encoding of Microtubule Lattices, Travis J. A. Craddock, Stuart Hameroff, and Jack A. Tuszynski

Link

A Critical Assessment of the Information Processing Capabilities of Neuronal Microtubules Using Coherent Excitations, Travis J. A. Craddock and Jack A. Tuszynski

Link

Temporal transitions in participation flow in an asynchronous discussion forum, Laurie P. Dringus and Timothy J. Ellis

Link

Facilitating discourse and enhancing teaching presence: Using mini audio presentations in online forums, Laurie P. Dringus, Martha M. Sndyer, and Steven R. Terrell

Link

Development and validation of a model to investigate the impact of individual factors on instructors’ intention to use e-learning systems, Bilquis Ferdousi and Yair Levy

Link

Implementation success model in government agencies: A case of a centralized identification system at NASA, Yair Levy and Theon L. Danet

Input Information Complexity, Perceived Time Pressure, and Information Processing in GSS-Based Work Groups: An Experimental Investigation Using a Decision Schema to Alleviate Information Overload Conditions, Souren Paul and Derek L. Nazareth

Parameter Estimation of Discrete and Continuous-Time Physical Models: A Similarity Transformation Approach, Jose A. Ramos and Paulo Lopes dos Santos

A Lumped Transfer Function Model for High Pressure Gas Pipelines, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, Jorge L. Martins de Carvalho, and J. Milhinhos

Gas Pipelines LPV Modelling and Identification for Leakage Detection, Jose A. Ramos, Paulo Lopes dos Santos, Teresa Paula Azevedo Perdicoulis, Gerhard Jank, Jorge L. Martins de Carvalho, and J. Milhinhos

A Pattern System of Underlying Theories for Process Improvement, Michael Van Hilst and Eduardo B. Fernandez

Measuring the Level of Security Introduced by Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, Nobukazu Yoshioka, and Hironori Washizaki

Remote Computing Resource Management from Mobile Devices by Utilizing WSRF, Michael Van Hilst, Shihong Huang, Junwei Cao, and Jan Mangs

A Pattern for a Sensor Node, Michael Van Hilst, Anupama Sahu, Eduardo B. Fernandez, and Mihaela Cardei

Link

Integrating communities of practice in e-portfolio assessment: Effects and experiences of mutual assessment in an online course, Ling Wang

Submissions from 2009

Beauchamp. G. & Kennewell, S. (2008). The influence of ICT on the interactivity of teaching. Education and Information Technologies, 13(4), 305-315, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Elegance in Written Language, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: New Beginnings, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Society, Technology and Education, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Technology that Improves the Quality of Life, Gertrude W. Abramson

Stone, R., Caird-Daley, A., & Bessell, K. (2009). SubSafe: a games-based training system for submarine safely and spatial awareness (Part 1). Virtual Reality, (13(1), 3-12, Gertrude W. Abramson

Distributed Detection of Attacks in Mobile Ad-Hoc Networks Using Learning Vector Quantization, James D. Cannady Jr.

Asset Priority Risk Assessment Using Hidden Markov Models, James D. Cannady Jr. and Charles Pak

Link

Information Processing Mechanisms in Microtubules at Physiological Temperature: Model Predictions for Experimental Tests, Travis J. A. Craddock, C. Beauchemin, and Jack A. Tuszynski

Comparison of Social Presence in Voice-Based and Text-Based Asynchronous Computer Conferences, Timothy J. Ellis and Karen King

Link

Towards a guide for novice researchers on research methodology: Review and proposed methods, Timothy J. Ellis and Yair Levy

Extending SCORM LOM, Timothy J. Ellis and Robert T. Mason

An Investigation of a Knowledge Management Solution for the Improvement of Reference Services, Timothy J. Ellis and Lynette L. Ralph

SimulSort: Multivariate Data Exploration Through an Enhanced Sorting Technique, Inkyoung Hur and Ji Soo Yi

Link

Approximation bounds for minimum information loss microaggregation, Michael J. Laszlo and Sumitra Mukherjee

Link

An empirical study of computer self-efficacy and the technology acceptance model in the military: A case of a U.S. Navy combat information system, Yair Levy and Bruce D. Green

Link

A value-satisfaction taxonomy of IS effectiveness (VSTISE): A case study of user satisfaction with IS and user-perceived value of IS, Yair Levy, Kenneth E. Murphy, and Stelios H. Zanakis

Link

Initial development of a learners’ ratified acceptance of multibiometrics intentions model (RAMIM), Yair Levy and Michelle M. Ramim

Link

Empirical assessment of college student-athletes' persistence in e-learning courses: A case study of a U.S. National Association of Intercollegiate Athletics (NAIA) institution, Anthony J. Nichols and Yair Levy

Identification of a Benchmark Wiener-Hammerstein System by Bilinear and Hammerstein–Bilinear Models, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho

Identification of Bilinear Systems with White Noise Inputs: An Iterative Deterministic-Stochastic Subspace Approach, Jose A. Ramos, Paulo Lopes dos Santos, and Jorge L. Martins de Carvalho

Link

Instructional-design theory to guide the creation of online learning communities for adults, Martha M. Snyder

Limiting Disclosure of Sensitive Attribute Values: An Active Approach, Junping Sun

Link

The development, validation, and application of the doctoral student connectedness scale, Steven R. Terrell, Martha M. Snyder, and Laurie P. Dingus

A Multi-Dimensional Classification for Users of Security Patterns, Michael Van Hilst, Eduardo B. Fernandez, and Fabricio Braz

Submissions from 2008

Dann, W., Cooper, S. & Pausch, R. (2006). Learning to program with Alice. Upper Saddle River, NJ: Prentice-Hall, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Online Collaborative Knowledge Base Development, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Social Networking Tools, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: The Evolving Learning Environment, Gertrude W. Abramson

Link

From the Desk of the Executive Editor: Written Communication and Learning, Gertrude W. Abramson

Emerging educational technology: Assessing the factors that influence instructors’ acceptance in information systems and other classrooms, Diane M. Ball and Yair Levy

Link

Editor’s choice 2008: Selected online learning resources, Laurie P. Dringus

Link

Framework of problem-based research: A guide for novice researchers on the development of a research-worthy problem, Timothy J. Ellis and Yair Levy

Link

An approximation algorithm for network design problems with downwards-monotone demand functions, Michael J. Laszlo and Sumitra Mukherjee

Link

An empirical development of critical value factors (CVF) of online learning activities: An application of activity theory and cognitive value theory, Yair Levy