Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Graduate Theses and Dissertations

2017

Communication and the arts

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Rock Art Management And Landscape Change: Mixed Field Assessment Techniques For Cultural Stone Decay, Kaelin M. Groom May 2017

Rock Art Management And Landscape Change: Mixed Field Assessment Techniques For Cultural Stone Decay, Kaelin M. Groom

Graduate Theses and Dissertations

As tourism continues to grow as one of the world’s most ubiquitous markets, the development and promotion of non-invasive techniques for cultural stone decay analysis and landscape change are vital to establishing conditional base-lines to best aid cultural heritage management (CRM) efficacy. Using rock art as a medium, this dissertation presents three independent case studies employing the Rock Art Stability Index (RASI) and repeat photography to explore the merits of mixed rapid field assessment techniques in relation to CRM and heritage tourism. While rock art is only one example of irreplaceable world heritage resources, examining how they decay and what …


Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla May 2017

Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla

Graduate Theses and Dissertations

Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information. They use data mining methods to formulate business strategies that yield high long-term and short-term financial benefits. While analyzing such data, the private information of the individuals present in the data must be protected for moral and legal reasons. Current practices such as redacting sensitive attributes, releasing only the aggregate values, and query auditing do not provide sufficient protection against an adversary armed with auxiliary information. In the presence of additional background information, the privacy protection …