Efficient Alignment Algorithms For Dna Sequencing Data, 2018 The University of Western Ontario
Efficient Alignment Algorithms For Dna Sequencing Data, Nilesh Vinod Khiste
Electronic Thesis and Dissertation Repository
The DNA Next Generation Sequencing (NGS) technologies produce data at a low cost, enabling their application to many ambitious fields such as cancer research, disease control, personalized medicine etc. However, even after a decade of research, the modern aligners and assemblers are far from providing efficient and error free genome alignments and assemblies respectively. This is due to the inherent nature of the genome alignment and assembly problem, which involves many complexities. Many algorithms to address this problem have been proposed over the years, but there still is a huge scope for improvement in this research space.
Many new genome ...
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, 2018 Pacific Northwest National Laboratory
Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro
Journal of Human Performance in Extreme Environments
In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types ...
Measuring Transaction Performance Based On Storage Approaches Of Native Xml Database, 2017 Ton Duc Thang University
Measuring Transaction Performance Based On Storage Approaches Of Native Xml Database, Shahab Shamshirband
Optimal Decomposition Strategy For Tree Edit Distance, 2017 The University of Western Ontario
Optimal Decomposition Strategy For Tree Edit Distance, Shaofeng Jiang
Electronic Thesis and Dissertation Repository
An ordered labeled tree is a tree where the left-to-right order among siblings is significant. Given two ordered labeled trees, the edit distance between them is the minimum cost edit operations that convert one tree to the other.
In this thesis, we present an algorithm for the tree edit distance problem by using the optimal tree decomposition strategy. By combining the vertical compression of trees with optimal decomposition we can significantly reduce the running time of the algorithm. We compare our method with other methods both theoretically and experimentally. The test results show that our strategies on compressed trees are ...
Demand Side Management In Smart Grid Using Big Data Analytics, 2017 Utah State University
Demand Side Management In Smart Grid Using Big Data Analytics, Sidhant Chatterjee
All Graduate Plan B and other Reports
Smart Grids are the next generation electrical grid system that utilizes smart meter-ing devices and sensors to manage the grid operations. Grid management includes the prediction of load and and classiﬁcation of the load patterns and consumer usage behav-iors. These predictions can be performed using machine learning methods which are often supervised. Supervised machine learning signiﬁes that the algorithm trains the model to eﬃciently predict decisions based on the previously available data.
Smart grids are employed with numerous smart meters that send user statistics to a central server. The data can be accumulated and processed using data mining and machine ...
Pubwc Bathroom Review App, 2017 California Polytechnic State University, San Luis Obispo
Pubwc Bathroom Review App, Clay Jacobs
For my senior project, I developed an iOS application to allow
users to find, rate, and review nearby public restrooms. The app takes
advantage of crowdsourced data to collect bathroom and review
information. I also created a REST API to interface with the backend
database that could be used to port the application to other platforms.
Streaming Mysql Database Activity To Aws Kinesis, 2017 California Polytechnic State University, San Luis Obispo
Streaming Mysql Database Activity To Aws Kinesis, Chris I. Voncina
No abstract provided.
Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, 2017 Boise State University
Cloudskulk: Design Of A Nested Virtual Machine Based Rootkit-In-The-Middle Attack, Joseph Anthony Connelly
Boise State University Theses and Dissertations
Virtualized cloud computing services are a crucial facet in the software industry today, with clear evidence of its usage quickly accelerating. Market research forecasts an increase in cloud workloads by more than triple, 3.3-fold, from 2014 to 2019 . Integrating system security is then an intrinsic concern of cloud platform system administrators that with the growth of cloud usage, is becoming increasingly relevant. People working in the cloud demand security more than ever. In this paper, we take an offensive, malicious approach at targeting such cloud environments as we hope both cloud platform system administrators and software developers of ...
How The National Library Of Medicine Can Add Evidence To Your Mhealth App, 2017 University of Massachusetts Medical School
How The National Library Of Medicine Can Add Evidence To Your Mhealth App, Susan Halpin, Sherry Pagoto
National Network of Libraries of Medicine New England Region (NNLM NER) Repository
Numerous systematic reviews of health-related mobile apps reveal they lack evidence based content. A major challenge to including evidence based content in apps is how to efficiently find accurate, credible, and vetted content. The National Library of Medicine houses the largest biomedical library in the world and provides numerous expert-developed online resources on disease and health education. In this webinar, Susan Halpin of the National Library of Medicine will introduce attendees to those resources, give examples of how they can and have been used in mobile apps, and discuss funding opportunities offered by the NLM.
2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, 2017 Southern Illinois University Carbondale
2fly With Rpi - Evaluating The Raspberry Pi For Glass Cockpit Applications, Donald R. Morris
ASA Multidisciplinary Research Symposium
Evaluating the capabilities of Raspberry Pi computers to be used in embedded glass cockpit applications for experimental aircraft. This includes details of what is required for these applications as well as how well the Raspberry Pi 3B can perform in this role.
Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, 2017 United States Military Academy
Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, Ernest Wong, Nan Porter, Mckinnon Hokanson, Bing Bing Xie
In April of 2007, Estonia fell victim to a series of distributed denial of service (DDoS) attacks that crippled its government websites, email servers, media outlets, and banking system for nearly a month. Due to the devastating effects of these cyber attacks, Estonia took great efforts to strengthen its cyber security protocols. This research analyzes the reforms that Estonia has implemented in its domestic and foreign policies and attempts to determine if any of it systemic improvements can help to also bolster cyber security in the United States (US). The findings from this research are that Estonia’s policy reforms ...
Priority Based Dynamic Resource Allocation In Cloud Computing, 2017 North Maharashtra University
Priority Based Dynamic Resource Allocation In Cloud Computing, Chandrashekhar Pawar
In Search Of Homo Sociologicus, 2017 The Graduate Center, City University of New York
In Search Of Homo Sociologicus, Yunqi Xue
All Dissertations, Theses, and Capstone Projects
The subject of this dissertation is to build an epistemic logic system that is able to show the spreading of knowledge and beliefs in a social network that contains multiple subgroups. Epistemic logic is the study of logical systems that express mathematical properties of knowledge and belief. In recent years, there have been increasing number of new epistemic logic systems that are focused on community properties such as knowledge and belief adoption among friends.
We are interested in revisable and actionable social knowledge/belief that leads to a large group action. Instead of centralized coordination, bottom-up approach is our focus ...
Natural Language Processing Based Generator Of Testing Instruments, 2017 California State University, San Bernardino
Natural Language Processing Based Generator Of Testing Instruments, Qianqian Wang
Electronic Theses, Projects, and Dissertations
Natural Language Processing (NLP) is the field of study that focuses on the interactions between human language and computers. By “natural language” we mean a language that is used for everyday communication by humans. Different from programming languages, natural languages are hard to be defined with accurate rules. NLP is developing rapidly and it has been widely used in different industries. Technologies based on NLP are becoming increasingly widespread, for example, Siri or Alexa are intelligent personal assistants using NLP build in an algorithm to communicate with people. “Natural Language Processing Based Generator of Testing Instruments” is a stand-alone program ...
Integrated Environment And Proximity Sensing For Uav Applications, 2017 University of Maine
Integrated Environment And Proximity Sensing For Uav Applications, Shawn S. Brackett
Electronic Theses and Dissertations
As Unmanned Aerial Vehicle (UAV), or “drone” applications expand, new methods for sensing, navigating and avoiding obstacles need to be developed. The project applies an Extended Kalman Filter (EKF) to a simulated quadcopter vehicle though Matlab in order to estimate not only the vehicle state but the world state around the vehicle. The EKF integrates multiple sensor readings from range sensors, IMU sensors, and radiation sensors and combines this information to optimize state estimates. The result is an estimated world map to be used in vehicle navigation and obstacle avoidance.
The simulation handles the physics behind the vehicle flight. As ...
Data-Driven Abstraction, 2017 Louisiana State University and Agricultural and Mechanical College
Data-Driven Abstraction, Vivian Mankau Ho
LSU Master's Theses
Given a program analysis problem that consists of a program and a property of interest, we use a data-driven approach to automatically construct a sequence of abstractions that approach an ideal abstraction suitable for solving that problem. This process begins with an infinite concrete domain that maps to a finite abstract domain defined by statistical procedures resulting in a clustering mixture model. Given a set of properties expressed as formulas in a restricted and bounded variant of CTL, we can test the success of the abstraction with respect to a predefined performance level. In addition, we can perform iterative abstraction-refinement ...
The Tax Treatment Of Tokens: What Does It Betoken?, 2017 University of Pennsylvania Law School
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, 2017 Louisiana State University and Agricultural and Mechanical College
Compiler And Runtime Optimization Techniques For Implementation Scalable Parallel Applications, Zahra Khatami
LSU Doctoral Dissertations
The compiler is able to detect the data dependencies in an application and is able to analyze the specific sections of code for parallelization potential. However, all of these techniques provided by a compiler are usually applied at compile time, so they rely on static analysis, which is insufficient for achieving maximum parallelism and desired application scalability. These compiler techniques should consider both the static information gathered at compile time and dynamic analysis captured at runtime about the system to generate a safe parallel application. On the other hand, runtime information is often speculative. Solely relying on it doesn't ...
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, 2017 The University of Texas MD Anderson Cancer Center UTHealth Graduate School of Biomedical Sciences
Computer-Aided Detection Of Pathologically Enlarged Lymph Nodes On Non-Contrast Ct In Cervical Cancer Patients For Low-Resource Settings, Brian M. Anderson, Laurence E. Court, Ann Klopp, Stephen F. Kry, Jennifer Johnson, Erik Cressman, Arvind Rao, Jinzhong Yang
UT GSBS Dissertations and Theses (Open Access)
The mortality rate of cervical cancer is approximately 266,000 people each year, and 70% of the burden occurs in Low- and Middle- Income Countries (LMICs). Radiation therapy is the primary modality for treatment of locally advanced cervical cancer cases. In the absence of high quality diagnostic imaging needed to identify nodal metastasis, many LMIC sites treat standard pelvic fields, failing to include node metastasis outside of the field and/or to boost lymph nodes in the abdomen and pelvis. The first goal of this project was to create a program which automatically identifies positive cervical cancer lymph nodes on ...
A Probabilistic Software Framework For Scalable Data Storage And Integrity Check, 2017 University of Tennessee, Knoxville
A Probabilistic Software Framework For Scalable Data Storage And Integrity Check, Sisi Xiong
Data has overwhelmed the digital world in terms of volume, variety and velocity. Data- intensive applications are facing unprecedented challenges. On the other hand, computation resources, such as memory, suffer from shortage comparing to data scale. However, in certain applications, it is a must to process large amount of data in a time efficient manner. Probabilistic approaches are compromises between these three perspectives: large amount of data, limited computation resources and high time efficiency, in the sense that those approaches cannot guarantee 100% correctness, their error rates, however, are predictable and adjustable depending on available computation resources and time constraints ...