Algonquin, IL, United States

United Information Technologies

www.uitonline.com
Algonquin, IL, United States
SEARCH FILTERS
Time filter
Source Type

Warren S.J.,University of North Texas | Dondlinger M.J.,University of North Texas | Dondlinger M.J.,Richland College | McLeod J.,United Information Technologies | Bigenho C.,University of North Texas
Computers and Education | Year: 2012

As higher education institutions seek to improve undergraduate education, initiatives are underway to target instructional methods, re-examine curricula, and apply innovative technologies to better engage students with content. This article discusses the findings of an exploratory study focused on a course redesign that game elements, PBL methods, and 3-D communication tools in an introductory computing course. Some of these findings included an appreciation for how the technology skills gained in the course applied to the world of work, an understanding of the significant role that interpersonal communications play in learning and in career success, a sense of empowerment fostered by access to resources, and an increased willingness to play, explore, and experiment with tools, content, and design processes. © 2011 Elsevier Ltd. All rights reserved.


Saarinen M.-J.O.,United Information Technologies | Brumley B.B.,Tampere University of Technology
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

WHIRLBOB, also known as STRIBOBr2, is an AEAD (Authenticated Encryption with Associated Data) algorithm derived from STRIBOBr1 and the Whirlpool hash algorithm. WHIRLBOB/ STRIBOBr2 is a second round candidate in the CAESAR competition. As with STRIBOBr1, the reduced-size Sponge design has a strong provable security link with a standardized hash algorithm. The new design utilizes only the LPS or ρ component of Whirlpool in flexibly domain-separated BLNK Sponge mode. The number of rounds is increased from 10 to 12 as a countermeasure against Rebound Distinguishing attacks. The 8×8 - bit S-Box used by Whirlpool and WHIRLBOB is constructed from 4 × 4 - bit “MiniBoxes”. We report on fast constant-time Intel SSSE3 and ARM NEON SIMD WHIRLBOB implementations that keep full miniboxes in registers and access them via SIMD shuffles. This is an efficient countermeasure against AES-style cache timing side-channel attacks. Another main advantage of WHIRLBOB over STRIBOBr1 (and most other AEADs) is its greatly reduced implementation footprint on lightweight platforms. On many lower-end microcontrollers the total software footprint of π+BLNK = WHIRLBOB AEAD is less than half a kilobyte. We also report an FPGA implementation that requires 4,946 logic units for a single round of WHIRLBOB, which compares favorably to 7,972 required for Keccak / Keyak on the same target platform. The relatively small S-Box gate count also enables efficient 64-bit bitsliced straight-line implementations. We finally present some discussion and analysis on the relationships between WHIRLBOB, Whirlpool, the Russian GOST Streebog hash, and the recent draft Russian Encryption Standard Kuznyechik. © Springer International Publishing Switzerland 2015.


Whitfield J.D.,Vienna Center for Quantum Science and Technology | Whitfield J.D.,Columbia University | Whitfield J.D.,United Information Technologies | Love P.J.,Haverford College | Aspuru-Guzik A.,Harvard University
Physical Chemistry Chemical Physics | Year: 2013

In quantum chemistry, the price paid by all known efficient model chemistries is either the truncation of the Hilbert space or uncontrolled approximations. Theoretical computer science suggests that these restrictions are not mere shortcomings of the algorithm designers and programmers but could stem from the inherent difficulty of simulating quantum systems. Extensions of computer science and information processing exploiting quantum mechanics has led to new ways of understanding the ultimate limitations of computational power. Interestingly, this perspective helps us understand widely used model chemistries in a new light. In this article, the fundamentals of computational complexity will be reviewed and motivated from the vantage point of chemistry. Then recent results from the computational complexity literature regarding common model chemistries including Hartree-Fock and density functional theory are discussed. © the Owner Societies 2013.


Ceccagnoli M.,Georgia Institute of Technology | Forman C.,Georgia Institute of Technology | Huang P.,United Information Technologies | Wu D.J.,Georgia Institute of Technology
Communications of the ACM | Year: 2014

Assessing the benefits and challenges of knowledge spillovers.


Dassanayake M.,Urbana University | Haas J.S.,United Information Technologies | Bohnert H.J.,Urbana University | Cheeseman J.M.,Urbana University
Functional and Integrative Genomics | Year: 2010

We present here the Mangrove Transcriptome Database (MTDB), an integrated, web-based platform providing transcript information from all 28 mangrove species for which information is available. Sequences are annotated, and when possible, GO clustered and assigned to KEGG pathways, making MTDB a valuable resource for approaching mangrove or other extremophile biology from the transcriptomic level. As one example outlining the potential of MTDB, we highlight the analysis of mangrove microRNA (miRNA) precursor sequences, miRNA target sites, and their conservation and divergence compared with model plants. MTDB is available at http://mangrove.illinois.edu . © 2010 Springer-Verlag.


Saparova D.,United Information Technologies
Perspectives in health information management / AHIMA, American Health Information Management Association | Year: 2012

The manuscript is an evaluative review of the literature pertaining to personal health records (PHRs). The primary focus was on revealing their potential to function as persuasive tools and their efficiency in this role. We demonstrated the ways in which PHRs could motivate, influence, and persuade patients in their adoption of target health behaviors associated with disease and medication management. We based this review on the theoretical framework of captology by B. J. Fogg and colleagues (1998) and the York methodological framework by Arksey and O'Malley (2005). The final sample of studies for review included 22 articles that met eligibility criteria and were retrieved from the SciVerse Scopus database (1999-present). Findings of this review were mixed. Some studies provided evidence that patients found PHRs easy to use and useful. The patients' self-efficacy and motivation in managing health conditions increased as a result of receiving personalized recommendations, guidance, and decision support generated in PHRs. Other studies, however, demonstrated the PHRs' lack of efficiency associated with the target behavior change. We explain the mixed findings by access to an unbalanced pool of study designs as well as the breadth of the applied theoretical framework of captology. We suggest future research in a more targeted direction, for example, focusing on the evidence of the efficiency of reminders as means for motivation, influence, and persuasion.


Gorban A.N.,University of Leicester | Gorban P.A.,United Information Technologies | Judge G.,University of California at Berkeley
Entropy | Year: 2010

The focus of this article is on entropy and Markov processes. We study the properties of functionals which are invariant with respect to monotonic transformations and analyze two invariant "additivity" properties: (i) existence of a monotonic transformation which makes the functional additive with respect to the joining of independent systems and (ii) existence of a monotonic transformation which makes the functional additive with respect to the partitioning of the space of states. All Lyapunov functionals for Markov chains which have properties (i) and (ii) are derived. We describe the most general ordering of the distribution space, with respect to which all continuous-time Markov processes are monotonic (the Markov order). The solution differs significantly from the ordering given by the inequality of entropy growth. For inference, this approach results in a convex compact set of conditionally "most random" distributions. © 2010 by the authors; licensee MDPI, Basel, Switzerland.


Schuman C.D.,United Information Technologies | Birdwell J.D.,United Information Technologies
Biologically Inspired Cognitive Architectures | Year: 2013

We introduce a discrete-event artificial neural network structure inspired by biological neural networks. It includes dynamic components and has variable structure. The network's topology and its dynamic components are modifiable and trainable for different applications. Such adaptation in the network's parameters, structure, and dynamic components makes it easier to adapt to varying behaviors due to the problem's structure than other types of networks. We demonstrate that this type of network structure can detect random changes in packet arrival rates in computer network traffic with possible applications in cyber security. © 2013 Elsevier B.V. All rights reserved.


Houser W.,United Information Technologies
IT Professional | Year: 2014

Before writing a single line of code, software engineers can increase application assurance by instituting the practice recommendations articulated in their enterprise architecture. Many Common Weakness Enumerations (CWEs) can be addressed in the architecture and design phases of the development life cycle. Architectural and design flaws found late in the SDLC can be costly to repair; often, these flaws are so baked into the application that they're resistant to code patches. The only viable response might be to catalogue their existence for a later redesign of the application. Moreover, patches to flaws can inject additional defects as well as alert adversaries to the existence of these flaws. © 1999-2012 IEEE.


Loading United Information Technologies collaborators
Loading United Information Technologies collaborators