- semigroups and automata theory
- Algorithms and Data Compression
- Computability, Logic, AI Algorithms
- Complexity and Algorithms in Graphs
- Information and Cyber Security
- Logic, Reasoning, and Knowledge
- Rough Sets and Fuzzy Logic
- Multi-Criteria Decision Making
- Logic, programming, and type systems
- Computational Geometry and Mesh Generation
- graph theory and CDMA systems
- Advanced Malware Detection Techniques
- Statistical and Computational Modeling
- Formal Methods in Verification
- Advanced Algebra and Logic
- Cloud Computing and Remote Desktop Technologies
- Advanced Graph Theory Research
- Polynomial and algebraic computation
- Natural Language Processing Techniques
- Network Security and Intrusion Detection
- Graph Labeling and Dimension Problems
- Advanced Text Analysis Techniques
- Topological and Geometric Data Analysis
- Machine Learning and Algorithms
- Bayesian Modeling and Causal Inference
California State University, Channel Islands
2015-2021
McMaster University
2003-2013
Southern Illinois University Carbondale
2009
Software (Spain)
2004
University of Missouri
1988
This study has been inspired by numerous requests for clarification from researchers who often confuse Saaty's Analytic Hierarchy Process (AHP) with the pairwise comparisons (PC) method, taking AHP as only representation of PC. should be regarded an interpretation and clarificatio n past investigations In addition, this article is a reflection on general PC research at higher level abstraction: philosophy science. It delves into foundations implications comparisons. Some results are based...
This study examines the problem of decay uniform resource locators (URLs) in health care management journals and seeks to determine whether continued availability at a given URL relates date publication, type resource, or top-level domain.The authors determined web-based resources cited articles published five source from 2002 2004. The data were analyzed using correlation, chi-square, descriptive statistics. Attempts made locate unavailable resources.After checking twice, 49.3% original...
An approximation is proposed for the posterior mean and standard deviation of ability parameter in an item response model. The procedure assumes that approximations to covariance matrix parameters are available. It based on a Taylor series conditional parameters. method illustrated two-parameter logistic model using data from ACT math test with 39 items. A numerical comparison empirical Bayes n = 400 examinees shows point estimates very similar but deviations under about 2% smaller than...
A shuffle of two strings is formed by interleaving the characters into a new string, keeping each string in order. square if it identical strings. There known polynomial time dynamic programming algorithm to determine given z x, y; however, has been an open question whether there square. We resolve this proving that problem NP-complete via many-one reduction from 3-Partition.
We introduce three formal theories of increasing strength for linear algebra in order to study the complexity concepts needed prove basic theorems subject. give what is apparently first feasible proofs Cayley-Hamilton theorem and other properties determinant, propositional proof matrix identities.
In the public imagination Cybersecurity is very much about malware, even though malware constitutes only part of all threats faced by experts. However, still one best methods to gain persistent access and control a target system. Malware often combined with well socially-engineered phishing attack that deceives user foothold on Once attakcer gains beachhead in victim's network, it may be used download additional payloads exploit vulnerabilities, more within network. Using as their foothold,...
The threat of social engineering is one that affects not only the financial and reputational well-being corporate entities but also basic rights individuals to privacy. Methods common health campaigns used disseminate information warning against have potential for success. By providing scenarios exact descriptions threats, recipients messages might become more aware dangers posed through Internet. Case studies effective will be examined, as well specific threats could avoided by awareness on...
As our world of digital devices continues to expand, the amount evidence encountered by law enforcement during case investigation is ever increasing. Faced with a preponderance high capacity media devices, forensic investigators must be able review them quickly, and establish which merit further attention. Utilizing small single-board computer called Raspberry Pi, this mobile forensics triage device provides fast, targeted feedback for immediate assessment. A presented in paper. It named...
This is an Innovate Practice Full Paper. The Cloud has become a principal paradigm of computing in the last ten years, and Computer Science curricula must be updated to reflect that reality. paper examines simple ways accomplish curriculum cloudification using Amazon Web Services (AWS), for other disciplines such as Business, Communication Mathematics.
We propose a research program for developing formal framework ranking procedures based on the Pairwise Comparisons method. are interested in case where relatively few items to be ranked with complex procedure and according large number of criteria. A typical example this scenario is competition several companies bid contract, selection winner done multiple criteria an intricate procedure. Several other applications suggested.
Fair and transparent procurement procedures are a cornerstone of well functioning free-market economy. In particular, bidding is mechanism whereby companies compete for contracts; when well, the process rewards both quality proposal, "reasonableness" quote. This way, company public win. The requires fair ranking procedure. Once parameters competition established, issuing bid required by law to abide those parameters. Not surprisingly, opposing interests may try "game system." more complex...