Christian Bach

Christian Bach
University of Bridgeport · Biomedical Engineering and Technology Management

Associate Professor (tenured), University of Bridgeport

About

95
Publications
139,803
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
564
Citations
Additional affiliations
August 2008 - April 2016
University of Bridgeport
Position
  • Professor (Associate)
August 2006 - May 2007
Clark University
Position
  • Visiting Research Professor
May 2006 - September 2009
Albany State University
Position
  • Research Associate

Publications

Publications (95)
Article
Full-text available
Zinc finger nucleases (ZFNs) are associated with cell death and apoptosis by binding at countless undesired locations. This cytotoxicity is associated with the binding ability of engineered zinc finger domains to bind dissimilar DNA sequences with high affinity. In general, binding preferences of transcription factors are associated with significan...
Article
Full-text available
Cancer is the second leading cause of death worldwide. Lung cancer possesses the highest mortality, with non-small cell lung cancer (NSCLC) being its most prevalent subtype of lung cancer. Despite gradual reduction in incidence, approximately 585720 new cancer patients were diagnosed in 2014, with majority from low-and-middle income countries (LMIC...
Conference Paper
Full-text available
Adopting open-source software (OSS) can help reduce the cost of personal computers for individuals, as well as the cost of information technology infrastructure for companies. Many studies corroborated the superiority of Linux (open-source operating system) when compared to Windows. Linux, or any other open-source software, offers robustness, flexi...
Poster
Full-text available
DNA origami-based spiral structure is synthesized to realize a nanoscale spiral antenna for biomedical applications. Single strand DNA (ssDNA) origami structures utilize self-assembly techniques and short ssDNA staples to develop the desired spiral structures. This poster will discuss the methods and protocol to develop DNA origami structure. We fu...
Article
Poverty extermination has been identified as the largest challenge facing international society in its mission for a peaceful, prosperous, and just world. I respond to this challenge by proposing a global poverty eradication principle. Stranded in John Rawls's account of human rights and assistance for the law of peoples, the global poverty eradica...
Article
This paper serves the purpose of reviewing and summarizing Qualitative research Method and investigating its structure, and different types of Data Collection and Data Analysis methods. A review centric research has been conducted, reviewing existing literature in order to accomplish a basic understanding of the topic and all factors associated wit...
Article
This paper serves the purpose of reviewing and summarizing Qualitative research Method and investigating its structure, and different types of Data Collection and Data Analysis methods. A review centric research has been conducted, reviewing existing literature in order to accomplish a basic understanding of the topic and all factors associated wit...
Article
Full-text available
There has been significant interest in deployment of correct scientific methodology, but conjectural efforts have not confirmed ample reorganization of the idiosyncratic qualities of the reliant variables as focal point of research. The emerging discipline of scientific studies is characterized by rising dis-junction between science and research. T...
Conference Paper
Full-text available
This paper reviews the factors that drive web service to be free for client. Some of web service stand pure and still free and other adopt advertisement banner. However, we trying to understand both and based on which element they run advertisement. Besides, how advertisement assist web as dual advantage for business and client. Illustrate the rela...
Article
Full-text available
Kidney toxicity is one of the biggest threats that causes failure in preclinical safety cases which later gives rise to Nephrotoxicity and is promoted by lots of pharmaceutical companies. We are one the verge of requiring pre- clinical tests and processes so that that we can get more candidates and innovate for them but unfortunately a competent dr...
Article
Full-text available
Wireless Sensor Networks (WSNs) have concerned much attention in recent years. The prospective applications of WSNs are massive. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applications including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. Wireless...
Article
Full-text available
The goal of this paper is to demonstrate the importance of using knowledge management and data mining for supporting marketing decisions. It shows how the data mining techniques and tools can extract hidden purchase patterns that can help to make better decisions by the marketers. Practically, knowledge management and data mining techniques are rea...
Article
Full-text available
This paper focuses on discussing and demonstrating multiculturalism. It also discusses the important factors that affect multiculturalism and how multiculturalism might be incorporated into the society to create a more convenient environment for all people. This search was carried out using peer reviewed journal articles and books which provided us...
Article
Full-text available
There has been a vast array of work undertaken to assess the factors of sustainable food security. The purpose of this study is to examine the role of four independent variables in respect to sustaining Global Food Security: Food Availability, Access to food, Nutrient Utilization, and food stability, which are usually referred to as the Pillars of...
Article
Full-text available
This paper aims to review the design of medical devices and investigate its relationship among different factors that must be taken into consideration throughout the process. The theoretical foundation of this paper was formed by conducting a comprehensive literature review on medical device design. A new model is presented to illustrate the relati...
Poster
Full-text available
The overall performance of mobile nodes is mainly affected by the relatively considerable time spent in the handoff process. Most of the time spent is mainly consumed during the authentication process. This process could be even longer especially when the Access Points (AP’s) are busy, which results in delays and/or packets loss. Many handoff techn...
Conference Paper
Full-text available
WiMAX (Worldwide Interoperability for Microwave Access) is an emerging broadband wireless technology for providing Last mile solutions for supporting higher bandwidth and multiple service classes with various quality of service requirement. The unique architecture of the WiMAX MAC and PHY layers that uses OFDMA to allocate multiple channels with di...
Conference Paper
Nowadays, information is everywhere and there is a need to organize and manage data and information in order for better use and successful business. Organizations are looking toward deploying and getting benefit of the knowledge and process the management in which call knowledge management. Main propose of knowledge management is to identify the ne...
Conference Paper
Full-text available
Conference Paper
Full-text available
The diversity of operating systems offer users more options to choose. The point of this study is to understand the aspects that affect the decision with respect to user's background and what core factors drive their choice of operating system. There are five elements that need to be considered before making a decision. The following factors and mo...
Conference Paper
Full-text available
this paper is conducted to analyze the performance of unicast networks under different criteria by using different queuing protocols. This was done by creating a network simulation through NS-2. The data traffic used in the simulation was CBR traffic and it is a representation of multimedia data in NS-2. The protocols that were tested in the simula...
Conference Paper
Full-text available
Keeping confidential hospital data away from outsiders and protecting patients' information is a basic right to privacy that people should expect and have. At the same time, the medical records of past and current patients should be up-to-date when a doctor or nurse needs them. In this modern age, it is vital that hospital staffs are trained in cre...
Article
Full-text available
The purpose of this research is to discuss the revolutionary endoscopy method WCE that would enhance the diagnostic accuracy and reliability level. Additionally, a comparison has been made with other currently in practice endoscopy methods to single out the strengths and advantages of such endoscopy method. The limitation of this research caused by...
Article
Full-text available
Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challe...
Article
Full-text available
In this paper; we introduce novel technique in which effective communication of the Smartphone can be achieved. It is used as a platform to investigate a correlation that exists between securing the Smartphone and efficient emergency communication. We conducted to include several radio technologies, such as cognitive radio (CR). Cognitive radio dea...
Article
Full-text available
Nowadays, corporations and a government agencies relay on computer-based information system to manage their information, this information may be classified, so it will be dangerous if it is disclosed by unauthorized persons. Therefore, there is urgent need for defense. In this research, defense has been categorized into four mechanisms technical de...
Article
Full-text available
In this paper, we present our novel contribution methodology based on the results of case study that has been implemented in our research environment to test with new technique the usability of both intelligent Android and Apple phones. This analysis of the case study stands for features similar to applications, operating system, hardware and softw...
Article
Full-text available
For clinical applications the biological functions of DNA-binding proteins require that they interact with their target binding site with high affinity and specificity. Advances in randomized production and target-oriented selection of engineered artificial DNA binding domains incited a rapidly expanding field of designer transcription factors (TFs...
Article
Full-text available
This paper discover the most administration security issues in Cloud Computing in term of trustworthy and gives the reader a big visualization of the concept of the Service Level Agreement in Cloud Computing and it's some security issues. Finding a model that mostly guarantee that the data be saved secure within setting for factors which are data l...
Article
Full-text available
The purpose of this research is to develop a model that would close the gap between marketing plans and strategies from one side and the advanced online collaboration applications platforms known as WEB 2.0 in order to implement marketing 2.0 smoothly without disrupting the working environment. We started by examining published articles related to...
Conference Paper
Facebook is considered as the largest social networks in the world. It can be a solution for Small and Medium Enterprises by exploited their features, such as Facebook Profiles, Groups, and Fan Pages for marketing purposes. Most of Small and Medium Enterprises today have adopted Facebook as their marketing medium but they have not measured the impa...
Conference Paper
Social media can be a solution for Small and Medium Enterprises by exploited their features, such as Facebook, Twitter, and YouTube for marketing purposes. Most of Small and Medium Enterprises today have adopted social media as their marketing medium but they have not measured the impact and effectiveness of the marketing they have done. To have a...
Conference Paper
Advances in genomics, proteomics, and bioinformatics have revolutionized the drug discovery and drug development. Computational systems biology, computational bioinformatics, and many biomedical applications are also growing at a rapid pace with an increasing demand for processing power. Hardware clusters and grid computing solutions are approached...
Conference Paper
Full-text available
Conference Paper
Full-text available
Innovation of technology and having fast Internet make information to distribute over the world easily and economically. This is made people to worry about their privacy and works. Steganography is a technique that prevents unauthorized users to have access to the important data. The steganography and digital watermarking provide methods that users...
Article
Full-text available
Most schools of engineering and business today have not yet come to terms with the growing inter-disciplinary education needs that adequately prepare PhD graduates for assuming leadership, professional, academic and/or research positions in academia, industry or government. The purpose of this paper is to contribute to a better nderstanding of how...
Article
Full-text available
The wireless technology and its application growing faster and faster in last decades. Mobile network is one of the fastest growing technologies in wireless network. This headed to some challenges that face mobile network such as how to serve the big number of users, efficiently of frequencies is scarce and interferes with each other. One of the so...
Article
Full-text available
Now a day with the Internet revolution, the online business has been one of the most popular and efficient marketing methods. The change of the economy has the biggest impact on the business method. For example: social networking and its influence, shopping type, creativity, and create a new business environment. Electronic business shows the succe...
Article
Full-text available
This study is directed to the business community regarding the planning of advertisements and more specifically implementing their reference prices. The aim is to investigate the effects of the presentation of reference prices of the consumers' behaviors. It is an empirical study in which the researcher has used literature reviews and survey to inv...
Article
Full-text available
Different strategies used to protect data against attackers, whose try to read data and analysis message transfer between sender and receiver. Nowadays network represent main road for message transfer over internet, special after heavy use of wireless network. In this paper we explore network classification and main advantages and disadvantages. Ne...
Article
Full-text available
The objectives of this contribution are to demonstrate the results of case study that has been conducted to test the usability of Android and Apple Smartphone. This case study covers features such as operating system, applications, battery life, hardware structure, and online websites. Questionnaires were used to gather user responses on aforementi...
Article
Full-text available
Deployment of emerging technologies and rapid change in industries has created a lot of risk for initiating the new projects. Many techniques and suggestions have been introduced but still lack the gap from various prospective. This paper proposes a reliable project scheduling approach. The objectives of project scheduling approach are to focus on...
Conference Paper
In this paper we present the development and implementation of a comprehensive interoperable computation tool to assist biomedical researchers to conduct, analyze and interpret experiments on a significantly accelerated pace. Explosion of biological data due to large scale genomic research and advances in high throughput tools results in massive di...
Conference Paper
In order to evaluate the value and usefulness of information systems that guide IS management actions and IS investments, DeLone and McLean established a universal definition of IS success that includes different perspectives of how information systems might be evaluated. The IS success taxonomy consists of six success categories (1) systems qualit...
Article
Purpose – The paper aims to demonstrate the usefulness of the intellectual bandwidth model (IB model) and expand its basic foundation to the bioscience industry. Design/methodology/approach – A case study of a real work example from the bioscience industry is presented. Findings – The study discusses an end-user information system and reveals that...
Conference Paper
Full-text available
“Knowledge net” (Knet) a platform that utilizes cloud computing is proposed to integrate researchers into a seamless web of collaborators that creatively utilize technology to accelerate discovery processes in the sciences. The advantages of cloud computing include scalability of technology and resources and accessibility of services to a broad aud...
Article
Internal Marketing (IM) by definition distinguishes between an organisation and its external environment and focuses only on intraorganisational affairs. However, globalisation and a knowledge-driven environment have produced a global networked economy with blurred boundaries between global companies and local market requirements. Organisational bo...
Conference Paper
Full-text available
Nunamaker et at. (2001) introduced the intellectual bandwidth (IB) model as a research tool to help decision makers to better understand value creation. Bach et al. (2003) used the IB model to map value creation attributes of an information system in a conceptual real-world business case involving the diagnosis and treatment of HIV patients. This p...
Conference Paper
Full-text available
Qureshi, et al. (2002) presented a case study where they used a framework, the intellectual bandwidth model to measure an organization's ability to create value. The model consists of two dimensions, information assimilation and collaboration. The IB model is a useful tool for managers because it enables them to plan solutions to complex business p...
Article
Full-text available
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization's ability to create value. The model consists of two dimensions, information assimilation and collaboration. The IB model is a useful tool for managers because it enables them to plan solutions to complex busine...