The following citations represent the scholarly and/or creative works attributed to East Tennessee State University faculty with SelectedWorks profiles.
If you are ETSU faculty and want your works to be included, please request a SelectedWorks profile by emailing your CV to digilib@etsu.edu.
Articles
A Deep Neural Network-Based Model for Named Entity Recognition for Hindi Language, Richa Sharma, Sudha Morwal, Basant Agarwal, Ramesh Chandra, and Mohammad S. Khan (2020)
A Kangaroo-Based Intrusion Detection System on Software-Defined Networks, Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, and Mohammad S. Khan (2021)
A Novel Software-Defined Drone Network (SDDN)-Based Collision Avoidance Strategies for on-Road Traffic Monitoring and Management, Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish K. Luhach, Mohammad S. Khan, and Anuraj Singh (2021)
A Novel Software-Defined Drone Network (SDDN)-Based Collision Avoidance Strategies for on-Road Traffic Monitoring and Management, Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish Kr Luhach, Mohammad S. Khan, and Anuraj Singh (2020)
Automated Cognitive Health Assessment in Smart Homes Using Machine Learning, Abdul R. Javed, Labiba G. Fahad, Asma A. Farhan, Sidra Abbas, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2021)
CH Selection via Adaptive Threshold Design Aligned on Network Energy, Trupti M. Behera, Sarita Nanda, Sushanta K. Mohapatra, Umesh C. Samal, Mohammad S. Khan, and Amir H. Gandomi (2021)
Computational Intelligent Sensor-rank Consolidation Approach for Industrial Internet of Things (IIoT), M. S. Mekala, Patan Rizwan, and Mohammad S. Khan (2021)
Computer Science (1978) Enrollment, Faculty, and Recruiting, Gordon L. Bailes and Terry A. Countermine (1979)
Design of a Novel Terahertz Metamaterial Absorber for Sensing Applications, Ayesha Mohanty, Om P. Acharya, Bhargav Appasani, S. K. Mohapatra, and Mohammad S. Khan (2021)
Developing Software in Bicultural Context: The Role of a SoDIS Inspection, Don Gotterbarn, Tony Clear, Wayne Gray, and Bryan Houliston (2006)
DRFS: Detecting Risk Factor of Stroke Disease from Social Media Using Machine Learning Techniques, S. Pradeepa, K. R. Manjula, S. Vimal, Mohammad S. Khan, Naveen Chilamkurti, and Ashish Kr Luhach (2020)
Ethics in Qualitative Studies of Commercial Software Enterprises Ethical Analysis, Donald Gotterbarn (2001)
ETH-LEACH: An Energy Enhanced Threshold Routing Protocol for WSNs, Prem K. Chithaluru, Mohammad S. Khan, Manoj Kumar, and Thompson Stephan (2021)
Green Communication in IoT Networks Using a Hybrid Optimization Algorithm, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rajesh Kaluri, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2020)
HVD-LSTM Based Recognition of Epileptic Seizures and Normal Human Activity, Pritam Khan, Yasin Khan, Sudhir Kumar, Mohammad S. Khan, and Amir H. Gandomi (2021)
Hybrid Model for Security-Aware Cluster Head Selection in Wireless Sensor Networks, Achyut Shankar, Natarajan Jaisankar, Mohammad S. Khan, Rizwan Patan, and Balusamy Balamurugan (2019)
Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles, Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, and Mohammad S. Khan (2019)
ICT Governance and What to Do About the Toothless Tiger(s): Professional Organizations and Codes of Ethics, Don Gotterbarn (2009)
Implementing an IT Concentration in a CS Department: Content, Rationale, and Initial Impact, Terry Countermine and Phil Pfeiffer (2000)
Improving the Response Time of M-Learning and Cloud Computing Environments Using a Dominant Firefly Approach, Kaushik Sekaran, Mohammad S. Khan, Rizwan Patan, Amir H. Gandomi, Parimala Venkata Krishna, and Suresh Kallam (2019)
Informatics and Professional Responsibility, Donald Gotterbarn (2001)
I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring, Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, and Amir H. Gandomi (2020)
Machines, Statues, and People: Strategies for Promoting RSI Awareness in Computing Curricula, Matt Heintzelman and Phil Pfeiffer (1997)
Mining of High-Utility Patterns in Big IoT-based Databases, Jimmy M. T. Wu, Gautam Srivastava, Jerry C. Lin, Youcef Djenouri, Min Wei, Reza M. Parizi, and Mohammad S. Khan (2021)
Multi-Camera Multiple Vehicle Tracking in Urban Intersections Based on Multilayer Graphs, Mohadeseh Delavarian, Omid Reza Marouzi, Hamid Hassanpour, Reza M. Parizi, and Mohammad S. Khan (2020)
Multi-Source Fusion for Weak Target Images in the Industrial Internet of Things, Keming Mao, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2021)
Perfection Is Not 'Good Enough': Beyond Software Development, Don Gotterbarn (2010)
Persistence Model of Non-traditional Online Learners: Self-Efficacy, Self-Regulation, and Self-Direction, Jacqueline S. Stephen, Amanda J. Rockinson-Szapkiw, and Chelsie Dubay (2020)
Perspectives on Professionalism in Computing, John Impagliazzo, Kevin Bowyer, Gerald L. Engel, Don Gotterbarn, Tony Greening, and John A.N. Lee (2000)
Predicting Flavonoid UGT Regioselectivity, Rhydon Jackson, Debra Knisley, Cecilia McIntosh, and Phillip Pfeiffer (2011)
R-CNN and Wavelet Feature Extraction for Hand Gesture Recognition With Emg Signals, Vimal Shanmuganathan, Harold Robinson Yesudhas, Mohammad S. Khan, Manju Khari, and Amir H. Gandomi (2020)
Reducing Inter-Process Communication Overhead in Parallel Sparse Matrix-Matrix Multiplication, Salman Ahmed, Jennifer Houser, Mohammad A. Hoque, Rezaul Raju, and Phil Pfeiffer (2017)
Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application, Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, and Amir H. Gandomi (2019)
Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks, T. Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, and Balamurugan Balusamy (2019)
Secure and Concealed Watchdog Selection Scheme Using Masked Distributed Selection Approach in Wireless Sensor Networks, Rajasoundaran Soundararajan, Narayanasamy Palanisamy, Rizwan Patan, Gayathri Nagasubramanian, and Mohammed S. Khan (2020)
SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning, Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, and Ghaith Husari (2021)
Symptoms-Based Fuzzy-Logic Approach for COVID-19 Diagnosis, Maad Shatnawi, Anas Shatnawi, Zakarea AlShara, and Ghaith Husari (2021)
The Ethics of Video Games: Mayhem, Death, and the Training of the Next Generation, Don Gotterbarn (2010)
The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, Donald Gotterbarn and Keith W. Miller (2009)
Validation of TAM Model on Social Media Use for Collaborative Learning to Enhance Collaborative Authoring, Wael M. Alenazy, Waleed Mugahed Al-Rahmi, and Mohammad S. Khan (2019)
VANETomo: A Congestion Identification and Control Scheme in Connected Vehicles Using Network Tomography, Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, and Mohammed Atiquzzaman (2020)
ZI Round, a MIP Rounding Heuristic, Chris Wallace (2010)
Book Contributions
A Practical Introduction to Input and Output Ports, David Tarnoff (2006)
A Practical Introduction to Serial Protocols, David Tarnoff (2006)
A Practical Mechanism for Ethical Risk Assessment-A SoDIS Inspection, Don Gotterbarn, Tony Clear, and Choon T. Kwan (2009)
Pedagogical Framework for Ethical Development, Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter (2007)
Software Design Ethics for Biomedicine, Don Gotterbarn and Simon Rogerson (2006)
Conference Proceedings
Addressing Ethical and Professional Risks of ICT Development Using Software Development Impact Statements, Don Gotterbarn (2002)
A Genetic Algorithm Model for Financial Asset Diversification, Tristan Onek (2019)
A Learning Model for Discrete Mathematics, Christopher Wallace (2008)
An Evaluation of Continuous Integration and Delivery Frameworks for Classroom Use, Jarred Light, Phil Pfeiffer, and Brian Bennett (2021)
An Experimental Investigation of Multi-Hop V2V Communication Delays using WSMP, Mohammad A. Hoque and Mohammad S. Khan (2019)
An Integrated Architecture for Simulation and Modeling of Small- and Medium-Sized Transportation and Communication Networks, Ahmed Elbery, Hesham Rakha, Mustafa Y. Elnainay, and Mohammad A. Hoque (2015)
A Scheduling Scheme for Efficient Wireless Charging of Sensor Nodes in WBAN, Md Khurram M. Rabby, Mohammad Shah Alam, Shamim Ara Shawkat, and Mohammad A. Hoque (2017)
Business Literacy for the Computer Science Professional, Greg L. Lowhorn and Anthony Pittarese (2008)
Comparative Study of Connected Vehicle Simulators, Md Salman Ahmed, Mohammad Asadul Hoque, and Phil Pfeiffer (2016)
Dealing With Independent Studies Courses—an Effective Methodology, Gordon Bailes and Jerry Sayer (1986)
DeepCNPP: Deep Learning Architecture to Distinguish the Promoter of Human Long Non-Coding RNA Genes and Protein-Coding Genes, Tanvir Alam, Mohammad Tariqul Islam, Mowafa Househ, Samir Brahim Belhaouari, and Ferdaus Ahmed Kawsar (2019)
DeepDSSR: Deep Learning Structure for Human Donor Splice Sites Recognition, Tanvir Alam, Mohammad Tariqul Islam, Mowafa Househ, Abdesselam Bouzerdoum, and Ferdaus Ahmed Kawsar (2019)
DFCV: A Novel Approach for Message Dissemination in Connected Vehicles Using Dynamic Fog, Anirudh Paranjothi, Mohammad S. Khan, and Mohammed Atiquzzaman (2018)
Energy-Efficient Routing for Greenhouse Monitoring Using Heterogeneous Sensor Networks, Trupti Mayee Behera, Mohammad S. Khan, Sushanta Kumar Mohapatra, Umesh Chandra Samail, and Md Zakirul Alam Bhuiyan (2019)
Enhancing Risk Analysis Using Software Development Impact Statements, D. Gotterbarn (2001)
F-Round: Fog-Based Rogue Nodes Detection in Vehicular Ad Hoc Networks, Anirudh Paranjothi, Mohammed Atiquzzaman, and Mohammad S. Khan (2020)
Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment, Anirudh Paranjothi, Mohammad S. Khan, and Mohammed Atiquzzaman (2018)
Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques, Kevin A. Jackson and Brian T. Bennett (2018)
Machine Learning Models Reveal The Importance of Clinical Biomarkers for the Diagnosis of Alzheimer's Disease, Mahmoud Ahmed Refaee, Amal Awadalla Mohamed Ali, Asma Hamid Elfadl, Maha F.A. Abujazar, Mohammad Tariqul Islam, Ferdaus Ahmed Kawsar, Mowafa Househ, Zubair Shah, and Tanvir Alam (2020)
Machine Learning Predictive Analytics for Player Movement Prediction in NBA: Applications, Opportunities, and Challenges, Dembe K. Stephanos, Ghaith Husari, Brian T. Bennett, and Emma Stephanos (2021)
Mobile Device Management: Policies for a Secured Mobile Workforce, Rita M. Barrios and Michael R. Lehrfeld (2012)
New Metrics for Assessing Aspect Coupling, Brian T. Bennett and Frank J. Mitropoulos (2016)
Open Source Software: Intellectual Challenges to the Status Quo, Marty J. Wolf, Kevin Bowyer, Don Gotterbarn, and Keith Miller (2002)
Plagiarism and Scholarly Publications: An Ethical Analysis, Donald Gotterbarn, Keith Miller, and John Impagliazzo (2006)
SAFARI-Taxi: Secure, Autonomic, FAult-Resilient, and Intelligent Taxi Hailing System, Mohammad A. Hoque, Phil Pfeiffer, Sanford Gabrielle, Edward Hall, and Elizabeth Turbyfill (2018)
Smart Home Security Application Enabled by IoT:: Using Arduino, Raspberry Pi, NodeJS, and MongoDB, Chad Davidson, Tahsin Rezwana, and Mohammad A. Hoque (2019)
Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET), David A. Schmidt, Mohammad S. Khan, and Brian T. Bennett (2019)
Thor: A Deep Learning Approach for Face Mask Detection to Prevent the COVID-19 Pandemic, Shay E. Snyder and Ghaith Husari (2021)
Tutorial: Using the Software Engineering Code of Ethics in Professional Computing Issues, Don Gotterbarn and Keith Miller (2008)
Using Hierarchical Agglomerative Clustering to Locate Potential Aspect Interference, Brian T. Bennett (2017)
XSLT and Application Maintainability: A Case Study, Andrew I. Stauffer and Phil Pfeiffer (2010)
Notes
Once More Unto the Breach': Professional Responsibility and Computer Ethics : A of Positive "Responsibility in Computing", Don Gotterbarn (2008)
Oral Presentation
Combining Fitts’s Law with Angular Size, Jacob Gillenwater, Stephen Fields, Cheryl Cornett, and Chrisopher Wallace
Design and Development of a Comprehensive and Interactive Diabetic Parameter Monitoring System, Nusrat Jahan Chowdhury, Joseph Blevins, Phoenix Ragsdale, Tahsin Rezwana, and Ferdaus Ahmed Kawsar Dr.
Microaggressions: Identifying and Responding to Acts of Prejudice, Teresa Carnevale, Chassidy Cooper, and Chelsie Dubay (2021)
SELF-ORGANIZED STRUCTURES: MODELING POLISTES DOMINULA NEST CONSTRUCTION WITH SIMPLE RULES, Matthew Harrison, Istvan Karsai, and Christopher Wallace
Short Surveys
A Survey on Congestion Detection and Control in Connected Vehicles, Anirudh Paranjothi, Mohammad S. Khan, and Sherali Zeadally (2020)