Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa Dec 2022

Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa

ETD Archive

No abstract provided.


An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi Dec 2022

An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi

ETD Archive

The current methods of the diagnosis of bloodstream infections are based on bacterial culture growth, a process that requires considerable time, e.g., 12-16 hours, to obtain a result. This long wait time for the result creates many problems, including the generation of multi-drug resistant organisms (MDROs). At the same time, infected bloodstream usually contains a very low concentration of bacteria, i.e., lower than 5 CFU/mL. The long diagnosis time and the extremely low concentration of bacteria in the infected bloodstream make such infections difficult to diagnose. Here, we demonstrate a culture-free approach for the diagnosis of bloodstream infections using a …


Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek Aug 2022

Cyberbullying Detection Using Weakly Supervised And Fully Supervised Learning, Abhinav Abhishek

ETD Archive

Machine learning is a very useful tool to solve issues in multiple domains such as sentiment analysis, fake news detection, facial recognition, and cyberbullying. In this work, we have leveraged its ability to understand the nuances of natural language to detect cyberbullying. We have further utilized it to detect the subject of cyberbullying such as age, gender, ethnicity, and religion. Further, we have built another layer to detect the cases of misogyny in cyberbullying. In one of our experiments, we created a three-layered architecture to detect cyberbullying , then to detect if it is gender based and finally if it …


Usability Engineering Of A Privacy-Aware Compliance Tracking System, Parameswara Reddy Annapureddy Jan 2019

Usability Engineering Of A Privacy-Aware Compliance Tracking System, Parameswara Reddy Annapureddy

ETD Archive

Software is useful when it is able to provide useful information to the end user with minimum effort. This thesis is about usability improvements to a privacy-aware human motion tracking system for healthcare professionals. The original system has a number of usability issues: (1) Users need to wear a smartwatch, which will be used to connect to the system; (2) Data are stored in XML, comma-separated-value format which is very difficult to analyze; (3) Data are available only at the local computer and there is no easy way to access them remotely via a Web or mobile interface; (4) Analysis …


Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky Jan 2016

Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky

ETD Archive

Mergers and acquisitions (M&A) are a common technique used by companies to grow and enter new markets. The success rate of these transactions continues to be less than desired. Information Systems (IS) have been proven to be a key component influencing the success of mergers. While numerous factors have been found to lead to systems integration success, the studies have not analyzed the fit that is required when two organizations and systems are joined. This research focuses on the match between organizational variables of competencies and processes of two merging companies, as well as the match between systems variables of …


Productivity At The Cost Of Efficiency: An Analysis Of Advanced C# Programming, Andrew Darovich Jan 2012

Productivity At The Cost Of Efficiency: An Analysis Of Advanced C# Programming, Andrew Darovich

ETD Archive

In this modern age of computer programming, there are many advanced features at our disposal. These are designed with elegance in mind and are put in place to allow programmers to be more productive. They are often meant to remove the need to know machine and system specifics so that programmers can focus on the higher level tasks at hand. What this analysis focuses on is examining what happens behind the scenes when using these advanced features. Performance for various new features of C# such as anonymous methods, reflection, and iterators were examined alongside more traditional programming styles in order …


Exploration Of Dynamic Web Page Partitioning For Increased Web Page Delivery Performance, Brian Michael Krupp Jan 2010

Exploration Of Dynamic Web Page Partitioning For Increased Web Page Delivery Performance, Brian Michael Krupp

ETD Archive

The increasing use of the Internet and demand for real-time information has increased the amount of dynamic content generated residing in more complex distributed environments. The performance of delivering these web pages has been improved through more traditional techniques such as caching and newer techniques such as pre-fetching. In this research, we explore the dynamic partitioning of web page content using concurrent AJAX requests to improve web page delivery performance for resource intensive synchronous web content. The focus is more on enterprise web applications that exist in an environment such that a page's data and processing is not local to …


Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut Jan 2008

Multiple Logs Analysis For Detecting Zero-Day Backdoor Trojans, Sinchai Caravut

ETD Archive

Trojan horses commonly known as "Trojans" are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker's malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent. The only way to keep computers and networks safe from them is by detecting them as soon as possible. Because of their quiet behavior, it's hard to detect by only IDS (Intrusion Detection System) log analysis therefore, multiple …