- Browse by Date Submitted
Department of Computer Science
Permanent URI for this community
Browse
Browsing Department of Computer Science by browse.metadata.dateaccessioned
Now showing 1 - 10 of 186
Results Per Page
Sort Options
Item Using Information Entropy to Monitor Chief Complaint Characteristics and Quality(2013) Grannis, Shaun J; Dixon, Brian E.; Xia, Yuni; Wu, JianminAs we enter the 'big medical data' era, a new core competency is to continuously monitor quality of data collected from electronic sources, including population surveillance data sources. We describe how entropy, a fundamental information measure, can help monitor the characteristics of chief complaints in an operational surveillance system.Item A Vision for the Systematic Monitoring and Improvement of the Quality of Electronic Health Data(2013) Dixon, Brian E.; Rosenman, Marc; Xia, Yuni; Grannis, Shaun JIn parallel with the implementation of information and communications systems, health care organizations are beginning to amass large-scale repositories of clinical and administrative data. Many nations seek to leverage so-called Big Data repositories to support improvements in health outcomes, drug safety, health surveillance, and care delivery processes. An unsupported assumption is that electronic health care data are of sufficient quality to enable the varied use cases envisioned by health ministries. The reality is that many electronic health data sources are of suboptimal quality and unfit for particular uses. To more systematically define, characterize and improve electronic health data quality, we propose a novel framework for health data stewardship. The framework is adapted from prior data quality research outside of health, but it has been reshaped to apply a systems approach to data quality with an emphasis on health outcomes. The proposed framework is a beginning, not an end. We invite the biomedical informatics community to use and adapt the framework to improve health data quality and outcomes for populations in nations around the world.Item The Internet Based Electronic Voting Enabling Open and Fair Election(Office of the Vice Chancellor for Research, 2014-04-11) Zou, Xukai; Li, Huian; Sui, Yan; Peng, Wei; Li, FengVoting is the pillar of modern democracies. However, examination of current voting systems (including E-voting techniques) shows a gap between casting secret ballots and tallying and verifying individual votes. This gap is caused by either disconnection between the vote-casting process and the vote-tallying process, or opaque transition (e.g. due to encryption) from vote- casting to vote-tallying and thus, damages voter assurance, i.e. failing to answer the question: “Will your vote count?” We proposed a groundbreaking E-voting protocol that fills this gap and provides a fully transparent election. In this new voting system, this transition is seamless, viewable, and verifiable. As a result, the above question can be answered assuredly: “Yes, my vote counts!” The new E-voting protocol is fundamentally different from all existing voting/E-voting protocols in terms of both concepts and the underlying mechanisms. It consists of three innovative Technical Designs: TD1: universal verifiable voting vector; TD2: forward and backward mutual lock voting; and TD3: in-process verification and enforcement. The new technique is the first fully transparent E-voting protocol which fills the aforementioned gap. The trust is split equally among all tallying authorities who are of conflict-of-interest and will technologically restrain from each other. As a result, the new technique enables open and fair elections, even for minor or weak political parties. It is able to mitigate errors and risk and detect fraud and attacks including collusion, with convincingly high probability 1 − 2−(m−log(m))n (n: #voters and m ≥ 2:#candidates). It removes many existing requirements such as trusted central tallying authorities, tailored hardware or software, and complex cryptographic primitives. In summary, the new e- voting technique delivers voter assurance and can transform the present voting booth based voting and election practice. Besides voting and elections, the new technique can also be adapted to other applications such as student class evaluation, rating and reputation systems.Item Revocable, Interoperable and User-Centric (Active) Authentication Across Cyberspace(Office of the Vice Chancellor for Research, 2014-04-11) Sui, Yan; Zou, Xukai; Du, Eliza Y.; Li, FengThis work addresses fundamental and challenging user authentication and universal identity issues and solves the problems of system usability, authentication data security, user privacy, irrevocability, interoperability, cross-matching attacks, and post-login authentication breaches associated with existing authentication systems. It developed a solid user-centric biometrics based authentication model, called Bio-Capsule (BC), and implemented an (active) authentication system. BC is the template derived from the (secure) fusion of a user’s biometrics and that of a Reference Subject (RS). RS is simply a physical object such as a doll or an artificial one, such as an image. It is users’ BCs, rather than original biometric templates, that are utilized for user authentication and identification. The implemented (active) authentication system will facilitate and safely protect individuals’ diffused cyber activities, which is particularly important nowadays, when people are immersed in cyberspace. User authentication is the first guard of any trustworthy computing system. Along with people’s immersion in the penetrated cyber space integrated with information, networked systems, applications and mobility, universal identity security& management and active authentication become of paramount importance for cyber security and user privacy. Each of three typical existing authentication methods, what you KNOW (Password/PIN), HAVE (SmartCard), and ARE (Fingerprint/Face/Iris) and their combinations, suffer from their own inherent problems. For example, biometrics is becoming a promising authentication/identification method because it binds an individual with his identity, is resistant to losses, and does not need to memorize/carry. However, biometrics introduces its own challenges. One serious problem with biometrics is that biometric templates are hard to be replaced once compromised. In addition, biometrics may disclose user’s sensitive information (such as race, gender, even health condition), thus creating user privacy concerns. In the recent years, there has been intensive research addressing biometric template security and replaceability, such as cancelable biometrics and Biometric Cryptosystems. Unfortunately, these approaches do not fully exploit biometric advantages (e.g., requiring a PIN), reduce authentication accuracy, and/or suffer from possible attacks. The proposed approach is the first elegant solution to effectively address irreplaceability, privacy-preserving, and interoperability of both login and after-login authentication. Our methodology preserves biometrics’ robustness and accuracy, without sacrificing system acceptability for the same user, and distinguishability between different users. Biometric features cannot be recovered from the user’s Biometric Capsule or Reference Subject, even when both are stolen. The proposed model can be applied at the signal, feature, or template levels, and facilitates integration with new biometric identification methods to further enhance authentication performance. Moreover, the proposed active, non-intrusive authentication is not only scalable, but also particularly suitable to emerging portable, mobile computing devices. In summary, the proposed approach is (i) usercentric, i.e., highly user friendly without additional burden on users, (ii) provably secure and resistant to attacks including cross-matching attacks, (iii) identity-bearing and privacy-preserving, (iv) replaceable, once Biometric Capsule is compromised, (v) scalable and highly adaptable, (vi) interoperable and single signing on across systems, and (vii) cost-effective and easy to use.Item Reliable Video over Software-Defined Networking (RVSDN)(IEEE, 2014-12) Owens, Harold II; Durresi, Arjan; Jain, Raj; Department of Computer & Information Science, IU School of ScienceEnsuring end-to-end quality of service for video applications requires the network to choose the most feasible path in terms of bandwidth, delay and jitter. Quality of service can only be ensured if the paths are reliable - perform to specification per request. This paper makes four contributions to research. First, it presents Reliable Video over Software-Defined Networking (RVSDN) which builds upon previous work of Video over Software-Defined Networking (VSDN) to address the issue of finding the most reliable path(s) through the network for video applications. Second, it presents the design and implementation of RVSDN. Third, it presents the experience of integrating RVSDN into ns-3 which is a network simulator used by the research community to simulate and model computer networks. Finally, it presents the results of RVSDN in terms of the number of requests serviced by the network architecture. RVSDN is able to service 31 times more requests than VSDN and MPLS explicit routing when the reliability constraint is 0.995 or greater using aggregation of reliability across network paths.Item CORBA-JS: An Open-Standards Framework for Distributed Object Computing over the Web(Office of the Vice Chancellor for Research, 2013-04-05) Parulekar, Tejal B.; Feiock, Dennis C.; Hill, James H.Distributed object computing (DOC) is a well-established software engineering paradigm for implementing distributed real-time and embedded (DRE) systems, such as real-time monitoring systems. Likewise, CORBA is a well-established DOC open-standard used in DRE systems. Due to many technological limitations, DOC was traditionally unavailable in Web-based applications (i.e., stateful applications that communicate over HTTP, and are accessible via a Web browser) without the use of proprietary, custom technologies. The problem with using proprietary, custom technology is it creates fragmentation in the solution space where some solutions are not available to all end-users (e.g., Web sites that only work within a certain Web browser because of the used technology). With the advent of HTML5 and WebSockets, which is an open-standard for enabling two-way communication over HTTP, DOC now has the necessary technological foundations to be realized within Web applications without the use of proprietary, custom technologies. To date, however, no researchers have attempted to apply DOC over HTTP using well-established DOC open-standards, such as CORBA. This research therefore is an initial investigation into implementing CORBA atop of HTML5 and WebSockets. As part of this research, we are investigating the challenges in realizing the solution, and proposing ways to improve the target programming languages and CORBA specification. Doing so will enable developers to create feature-rich real-time Web applications that improve upon current state-of-the-art approaches, e.g., Asynchronous XML and JavaScript (AJAX), that are resource intensive (e.g., use a lot of CPU, network bandwidth, and memory) and hard to program.Item Qualitative and Quantitative Evaluation of Static Code Analysis Tools(Office of the Vice Chancellor for Research, 2013-04-05) Velicheti, Lakshmi Manohar Rao; Feiock, Dennis C.; Raje, Rajeev R.; Hill, James H.Static code analysis (SCA) is a methodology of detecting errors in programs without actually compiling the source code to binary format and executing it on a machine. The main goal of a SCA tool is to aid developers in quickly identifying errors that can jeopardize the security and integrity of the program. With the vast array of SCA tools available, each specializing in particular languages, error types, and detection methodologies, choosing the optimal tool(s) can be a daunting task for any software developer, or organization. This, however, is not a problem associated only with SCA tools, but applies to any application domain where many tools exist and a selection of a subset of these tools is needed for effectively tackling a given problem. To address this fundamental challenge with selecting the most appropriate SCA tool for a particular problem, this research is performing a comprehensive study of different available SCA tool, both commercial and open-source. The end goal of this study is to not only evaluate how different SCA tools perform with respect to locating specific errors in source code (i.e., the quality of the tool), but to model the behavior of each SCA tool using quantitative metrics gathered from the source code, such as source lines of code (SLOC), cyclometic complexity, and function points. The behavioral model can then be used to prescreen existing (and new) source code, and select the most appropriate SCA tool, or set of SCA tools, that can identify the most errors in the source code undergoing analysis.Item Video over Software Defined Networking(Office of the Vice Chancellor for Research, 2013-04-05) Owens II, Harold; Durresi, ArjanSupporting end-to-end quality of service (QoS) for video applications requires the network to select optimum path among multiple paths to improve application performance. Multiple network paths from source to destination may be available but due to current network high coupling design identifying alternate paths is difficult. Network architecture, like Integrated services (IntServ), install a single path from source to destination which may not be optimum path for the application. Furthermore, it is an arduous task for video application developers to request service from IntServ. This paper provides three contributions to research on providing end-to-end QoS for video applications. First, it presents video over software defined networking (VSDN) - an architecture that is capable of making optimum path selection utilizing a global network view. Second, it describes the VSDN protocol used by video application developers to request service from VSDN enabled networks. Third, it presents the results of implementing a prototype of VSDN and quantitatively evaluates its behavior. The results show that VSDN has a linear-message complexity.Item Integrated Health Coach System(2012-04-13) Durresi, ArjanThe primary motivation of our project is that, as much research has shown, for most chronic diseases simple lifestyle changes, such as diet and exercise, can be the most effective actions to ameliorate the condition. However, for most people such lifestyle changes become very difficult, if not impossible. Our Integrated Health Coach System will provide patients with immediate feedback regarding the results of their changes in diet and exercise. For example, the physical activity will be captured by the accelerometers implemented in the smart phone. The food used will be captured by the combination of smartphone camera and food description (by voice and text). In addition, the smartphone will record all medications and supplements the patient takes daily. Furthermore, in case of diabetes patients, the smartphone will collect the daily weight, as well as blood sugar levels and blood pressure. All this data will be stored and treated in a cloud computing application, which will correlate changes in diet and exercise to corresponding medical data. Such data will be shown to patients periodically, such that they can really see the concrete results of their actions. For example, one week of changes in diet and exercise would show considerable improvement in blood sugar levels. Alternatively, the application could show rising blood sugar levels in correspondence with lack of physical activity and an unhealthy diet. Such feedback will act as a strong motivator for people to continue with their changes in diet and exercise. The system will be integrated with social network tools, such as Facebook, to enable the creation of support groups for patients to share experiences, efforts, goals and achievements in handling their chronic condition. This social network interaction will be another great support and motivator for people to change their diet and exercise.Item TRUSTED SERVICE REPRESENTATION AND SELECTION FOR GENERATING DISTRIBUTED REAL-TIME AND EMBEDDED SYSTEMS(Office of the Vice Chancellor for Research, 2012-04-13) Gallege, Lahiru S.; Gamage, Dimuthu U.; Hill, James H.; Raje, Rajeev R.Today’s enterprise distributed real-time and embedded (DRE) systems are created from reusable software components and services. This approach is promising because of its economic advantages (e.g., maximizing reuse of existing business-logic). It, however, is plagued by the challenge of selecting a subset of software components and services from those that are readily available because the selection process can be both costly and time-consuming, and the description of available services is often ambiguous and easy to misinterpret. Moreover, there is always the chance that a selected service does not adhere to its promises. This implies that trust, which we de-fine as the degree of confidence that a software component or service ad-heres to its specification, plays an important role in this selection process. We call this process trusted selection. Current state-of-the-art methods use multi-level contracts made up of four levels (i.e., syntax, semantics, synchronization and Quality of Service (QoS)) to facilitate service and component selection. This method, however, does not take trust into account thereby making it hard to support trusted selection. Our research therefore improves upon state-of-the-art in multi-level specification by incorporating trust contract into it. We incorporate trust into the multi-level specification by representing trust using subjective logic, which evaluates trust using a tuple of belief, disbelief, and uncertainty. Our current results show our trust-enabled multi-level specification reduces mis-interpretation, mismatch, and misuse of selected services.