The following citations represent the scholarly and/or creative works attributed to East Tennessee State University faculty with SelectedWorks profiles.

If you are ETSU faculty and want your works to be included, please request a SelectedWorks profile by emailing your CV to digilib@etsu.edu.

Follow


Articles

Link

A Deep Neural Network-Based Model for Named Entity Recognition for Hindi Language, Richa Sharma, Sudha Morwal, Basant Agarwal, Ramesh Chandra, and Mohammad S. Khan (2020)

Link

A Kangaroo-Based Intrusion Detection System on Software-Defined Networks, Abbas Yazdinejadna, Reza M. Parizi, Ali Dehghantanha, and Mohammad S. Khan (2021)

Link

A Novel Software-Defined Drone Network (SDDN)-Based Collision Avoidance Strategies for on-Road Traffic Monitoring and Management, Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish K. Luhach, Mohammad S. Khan, and Anuraj Singh (2021)

Link

A Novel Software-Defined Drone Network (SDDN)-Based Collision Avoidance Strategies for on-Road Traffic Monitoring and Management, Adarsh Kumar, Rajalakshmi Krishnamurthi, Anand Nayyar, Ashish Kr Luhach, Mohammad S. Khan, and Anuraj Singh (2020)

Link

Automated Cognitive Health Assessment in Smart Homes Using Machine Learning, Abdul R. Javed, Labiba G. Fahad, Asma A. Farhan, Sidra Abbas, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2021)

Link

CH Selection via Adaptive Threshold Design Aligned on Network Energy, Trupti M. Behera, Sarita Nanda, Sushanta K. Mohapatra, Umesh C. Samal, Mohammad S. Khan, and Amir H. Gandomi (2021)

Link

Computational Intelligent Sensor-rank Consolidation Approach for Industrial Internet of Things (IIoT), M. S. Mekala, Patan Rizwan, and Mohammad S. Khan (2021)

Link

Computer Science (1978) Enrollment, Faculty, and Recruiting, Gordon L. Bailes and Terry A. Countermine (1979)

Link

Design of a Novel Terahertz Metamaterial Absorber for Sensing Applications, Ayesha Mohanty, Om P. Acharya, Bhargav Appasani, S. K. Mohapatra, and Mohammad S. Khan (2021)

Link

Developing Software in Bicultural Context: The Role of a SoDIS Inspection, Don Gotterbarn, Tony Clear, Wayne Gray, and Bryan Houliston (2006)

Link

DRFS: Detecting Risk Factor of Stroke Disease from Social Media Using Machine Learning Techniques, S. Pradeepa, K. R. Manjula, S. Vimal, Mohammad S. Khan, Naveen Chilamkurti, and Ashish Kr Luhach (2020)

Link

Ethics in Qualitative Studies of Commercial Software Enterprises Ethical Analysis, Donald Gotterbarn (2001)

Link

ETH-LEACH: An Energy Enhanced Threshold Routing Protocol for WSNs, Prem K. Chithaluru, Mohammad S. Khan, Manoj Kumar, and Thompson Stephan (2021)

Link

Green Communication in IoT Networks Using a Hybrid Optimization Algorithm, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Rajesh Kaluri, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2020)

Link

HVD-LSTM Based Recognition of Epileptic Seizures and Normal Human Activity, Pritam Khan, Yasin Khan, Sudhir Kumar, Mohammad S. Khan, and Amir H. Gandomi (2021)

Link

Hybrid Model for Security-Aware Cluster Head Selection in Wireless Sensor Networks, Achyut Shankar, Natarajan Jaisankar, Mohammad S. Khan, Rizwan Patan, and Balusamy Balamurugan (2019)

Link

Hybrid-Vehfog: A Robust Approach for Reliable Dissemination of Critical Messages in Connected Vehicles, Anirudh Paranjothi, Urcun Tanik, Yuehua Wang, and Mohammad S. Khan (2019)

ICT Governance and What to Do About the Toothless Tiger(s): Professional Organizations and Codes of Ethics, Don Gotterbarn (2009)

Link

Implementing an IT Concentration in a CS Department: Content, Rationale, and Initial Impact, Terry Countermine and Phil Pfeiffer (2000)

Link

Improving the Response Time of M-Learning and Cloud Computing Environments Using a Dominant Firefly Approach, Kaushik Sekaran, Mohammad S. Khan, Rizwan Patan, Amir H. Gandomi, Parimala Venkata Krishna, and Suresh Kallam (2019)

Link

Informatics and Professional Responsibility, Donald Gotterbarn (2001)

Link

I-SEP: An Improved Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring, Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, and Amir H. Gandomi (2020)

Link

Machines, Statues, and People: Strategies for Promoting RSI Awareness in Computing Curricula, Matt Heintzelman and Phil Pfeiffer (1997)

Link

Mining of High-Utility Patterns in Big IoT-based Databases, Jimmy M. T. Wu, Gautam Srivastava, Jerry C. Lin, Youcef Djenouri, Min Wei, Reza M. Parizi, and Mohammad S. Khan (2021)

Link

Multi-Camera Multiple Vehicle Tracking in Urban Intersections Based on Multilayer Graphs, Mohadeseh Delavarian, Omid Reza Marouzi, Hamid Hassanpour, Reza M. Parizi, and Mohammad S. Khan (2020)

Link

Multi-Source Fusion for Weak Target Images in the Industrial Internet of Things, Keming Mao, Gautam Srivastava, Reza M. Parizi, and Mohammad S. Khan (2021)

Link

Perfection Is Not 'Good Enough': Beyond Software Development, Don Gotterbarn (2010)

Link

Persistence Model of Non-traditional Online Learners: Self-Efficacy, Self-Regulation, and Self-Direction, Jacqueline S. Stephen, Amanda J. Rockinson-Szapkiw, and Chelsie Dubay (2020)

Link

Perspectives on Professionalism in Computing, John Impagliazzo, Kevin Bowyer, Gerald L. Engel, Don Gotterbarn, Tony Greening, and John A.N. Lee (2000)

PDF

Predicting Flavonoid UGT Regioselectivity, Rhydon Jackson, Debra Knisley, Cecilia McIntosh, and Phillip Pfeiffer (2011)

Link

R-CNN and Wavelet Feature Extraction for Hand Gesture Recognition With Emg Signals, Vimal Shanmuganathan, Harold Robinson Yesudhas, Mohammad S. Khan, Manju Khari, and Amir H. Gandomi (2020)

Link

Reducing Inter-Process Communication Overhead in Parallel Sparse Matrix-Matrix Multiplication, Salman Ahmed, Jennifer Houser, Mohammad A. Hoque, Rezaul Raju, and Phil Pfeiffer (2017)

Link

Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application, Trupti Mayee Behera, Sushanta Kumar Mohapatra, Umesh Chandra Samal, Mohammad S. Khan, Mahmoud Daneshmand, and Amir H. Gandomi (2019)

Link

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks, T. Poongodi, Mohammed S. Khan, Rizwan Patan, Amir H. Gandomi, and Balamurugan Balusamy (2019)

Link

Secure and Concealed Watchdog Selection Scheme Using Masked Distributed Selection Approach in Wireless Sensor Networks, Rajasoundaran Soundararajan, Narayanasamy Palanisamy, Rizwan Patan, Gayathri Nagasubramanian, and Mohammed S. Khan (2020)

PDF

SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning, Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, and Ghaith Husari (2021)

PDF

Symptoms-Based Fuzzy-Logic Approach for COVID-19 Diagnosis, Maad Shatnawi, Anas Shatnawi, Zakarea AlShara, and Ghaith Husari (2021)

Link

The Ethics of Video Games: Mayhem, Death, and the Training of the Next Generation, Don Gotterbarn (2010)

Link

The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, Donald Gotterbarn and Keith W. Miller (2009)

Link

Validation of TAM Model on Social Media Use for Collaborative Learning to Enhance Collaborative Authoring, Wael M. Alenazy, Waleed Mugahed Al-Rahmi, and Mohammad S. Khan (2019)

Link

VANETomo: A Congestion Identification and Control Scheme in Connected Vehicles Using Network Tomography, Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, and Mohammed Atiquzzaman (2020)

Link

ZI Round, a MIP Rounding Heuristic, Chris Wallace (2010)

Book Contributions

Link

A Practical Introduction to Input and Output Ports, David Tarnoff (2006)

Link

A Practical Introduction to Serial Protocols, David Tarnoff (2006)

Link

A Practical Mechanism for Ethical Risk Assessment-A SoDIS Inspection, Don Gotterbarn, Tony Clear, and Choon T. Kwan (2009)

Link

Pedagogical Framework for Ethical Development, Melissa Dark, Richard Epstein, Linda Morales, Terry Countermine, Qing Yuan, Muhammed Ali, Matt Rose, and Nathan Harter (2007)

Link

Software Design Ethics for Biomedicine, Don Gotterbarn and Simon Rogerson (2006)

Conference Proceedings

Link

Addressing Ethical and Professional Risks of ICT Development Using Software Development Impact Statements, Don Gotterbarn (2002)

Link

A Genetic Algorithm Model for Financial Asset Diversification, Tristan Onek (2019)

A Learning Model for Discrete Mathematics, Christopher Wallace (2008)

Link

An Evaluation of Continuous Integration and Delivery Frameworks for Classroom Use, Jarred Light, Phil Pfeiffer, and Brian Bennett (2021)

Link

An Experimental Investigation of Multi-Hop V2V Communication Delays using WSMP, Mohammad A. Hoque and Mohammad S. Khan (2019)

Link

An Integrated Architecture for Simulation and Modeling of Small- and Medium-Sized Transportation and Communication Networks, Ahmed Elbery, Hesham Rakha, Mustafa Y. Elnainay, and Mohammad A. Hoque (2015)

Link

A Scheduling Scheme for Efficient Wireless Charging of Sensor Nodes in WBAN, Md Khurram M. Rabby, Mohammad Shah Alam, Shamim Ara Shawkat, and Mohammad A. Hoque (2017)

PDF

Business Literacy for the Computer Science Professional, Greg L. Lowhorn and Anthony Pittarese (2008)

Link

Comparative Study of Connected Vehicle Simulators, Md Salman Ahmed, Mohammad Asadul Hoque, and Phil Pfeiffer (2016)

Link

Dealing With Independent Studies Courses—an Effective Methodology, Gordon Bailes and Jerry Sayer (1986)

Link

DeepCNPP: Deep Learning Architecture to Distinguish the Promoter of Human Long Non-Coding RNA Genes and Protein-Coding Genes, Tanvir Alam, Mohammad Tariqul Islam, Mowafa Househ, Samir Brahim Belhaouari, and Ferdaus Ahmed Kawsar (2019)

Link

DeepDSSR: Deep Learning Structure for Human Donor Splice Sites Recognition, Tanvir Alam, Mohammad Tariqul Islam, Mowafa Househ, Abdesselam Bouzerdoum, and Ferdaus Ahmed Kawsar (2019)

Link

DFCV: A Novel Approach for Message Dissemination in Connected Vehicles Using Dynamic Fog, Anirudh Paranjothi, Mohammad S. Khan, and Mohammed Atiquzzaman (2018)

Link

Energy-Efficient Routing for Greenhouse Monitoring Using Heterogeneous Sensor Networks, Trupti Mayee Behera, Mohammad S. Khan, Sushanta Kumar Mohapatra, Umesh Chandra Samail, and Md Zakirul Alam Bhuiyan (2019)

Link

Enhancing Risk Analysis Using Software Development Impact Statements, D. Gotterbarn (2001)

Link

F-Round: Fog-Based Rogue Nodes Detection in Vehicular Ad Hoc Networks, Anirudh Paranjothi, Mohammed Atiquzzaman, and Mohammad S. Khan (2020)

Link

Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment, Anirudh Paranjothi, Mohammad S. Khan, and Mohammed Atiquzzaman (2018)

Link

Locating SQL Injection Vulnerabilities in Java Byte Code Using Natural Language Techniques, Kevin A. Jackson and Brian T. Bennett (2018)

Link

Machine Learning Models Reveal The Importance of Clinical Biomarkers for the Diagnosis of Alzheimer's Disease, Mahmoud Ahmed Refaee, Amal Awadalla Mohamed Ali, Asma Hamid Elfadl, Maha F.A. Abujazar, Mohammad Tariqul Islam, Ferdaus Ahmed Kawsar, Mowafa Househ, Zubair Shah, and Tanvir Alam (2020)

Link

Machine Learning Predictive Analytics for Player Movement Prediction in NBA: Applications, Opportunities, and Challenges, Dembe K. Stephanos, Ghaith Husari, Brian T. Bennett, and Emma Stephanos (2021)

PDF

Mobile Device Management: Policies for a Secured Mobile Workforce, Rita M. Barrios and Michael R. Lehrfeld (2012)

Link

New Metrics for Assessing Aspect Coupling, Brian T. Bennett and Frank J. Mitropoulos (2016)

Link

Open Source Software: Intellectual Challenges to the Status Quo, Marty J. Wolf, Kevin Bowyer, Don Gotterbarn, and Keith Miller (2002)

Link

Plagiarism and Scholarly Publications: An Ethical Analysis, Donald Gotterbarn, Keith Miller, and John Impagliazzo (2006)

Link

SAFARI-Taxi: Secure, Autonomic, FAult-Resilient, and Intelligent Taxi Hailing System, Mohammad A. Hoque, Phil Pfeiffer, Sanford Gabrielle, Edward Hall, and Elizabeth Turbyfill (2018)

Link

Smart Home Security Application Enabled by IoT:: Using Arduino, Raspberry Pi, NodeJS, and MongoDB, Chad Davidson, Tahsin Rezwana, and Mohammad A. Hoque (2019)

Link

Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET), David A. Schmidt, Mohammad S. Khan, and Brian T. Bennett (2019)

Link

Thor: A Deep Learning Approach for Face Mask Detection to Prevent the COVID-19 Pandemic, Shay E. Snyder and Ghaith Husari (2021)

Link

Tutorial: Using the Software Engineering Code of Ethics in Professional Computing Issues, Don Gotterbarn and Keith Miller (2008)

Link

Using Hierarchical Agglomerative Clustering to Locate Potential Aspect Interference, Brian T. Bennett (2017)

Link

XSLT and Application Maintainability: A Case Study, Andrew I. Stauffer and Phil Pfeiffer (2010)

Notes

Link

Once More Unto the Breach': Professional Responsibility and Computer Ethics : A of Positive "Responsibility in Computing", Don Gotterbarn (2008)

Oral Presentation

Combining Fitts’s Law with Angular Size, Jacob Gillenwater, Stephen Fields, Cheryl Cornett, and Chrisopher Wallace

Design and Development of a Comprehensive and Interactive Diabetic Parameter Monitoring System, Nusrat Jahan Chowdhury, Joseph Blevins, Phoenix Ragsdale, Tahsin Rezwana, and Ferdaus Ahmed Kawsar Dr.

Microaggressions: Identifying and Responding to Acts of Prejudice, Teresa Carnevale, Chassidy Cooper, and Chelsie Dubay (2021)

SELF-ORGANIZED STRUCTURES: MODELING POLISTES DOMINULA NEST CONSTRUCTION WITH SIMPLE RULES, Matthew Harrison, Istvan Karsai, and Christopher Wallace

Short Surveys

Link

A Survey on Congestion Detection and Control in Connected Vehicles, Anirudh Paranjothi, Mohammad S. Khan, and Sherali Zeadally (2020)