Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Multiclass Classification Of Risk Factors For Cervical Cancer Using Artificial Neural Networks, Abdullah Al Mamun Jan 2018

Multiclass Classification Of Risk Factors For Cervical Cancer Using Artificial Neural Networks, Abdullah Al Mamun

Electronic Theses and Dissertations

World Health Organization statistics show that cervical cancer is the fourth most frequent cancer in women with an estimated 530,000 new cases in 2012. Cervical cancer diagnosis typically involves liquid-based cytology (LBC) followed by a pathologist review. The accuracy of decision is therefore highly influenced by the expert’s skills and experience, resulting in relatively high false positive and/or false negative rates. Moreover, given the fact that the data being analyzed is highly dimensional, same reviewer’s decision is inherently affected by inconsistencies in interpreting the data. In this study, we use an Artificial Neural Network based model that aims to considerably …


Sparse Trees With A Given Degree Sequence, Ao Shen Jan 2018

Sparse Trees With A Given Degree Sequence, Ao Shen

Electronic Theses and Dissertations

In this thesis, we consider the properties of sparse trees and summarized a certain class of trees under some constraint (including with a given degree sequence, with given number of leaves, with given maximum degree, etc.) which have maximum Wiener index and the minimum number of subtrees at the same time. Wiener index is one of the most important topological indices in chemical graph theory. Steiner k�� Wiener index can be regarded as the generalization of Wiener index, when k = 2, Steiner Wiener index is the same as Wiener index. Steiner k�� Wiener index of a tree T is …


Isolated Mobile Malware Observation, Augustine Paul Jan 2018

Isolated Mobile Malware Observation, Augustine Paul

Electronic Theses and Dissertations

The idea behind Bring Your Own Device (BYOD) it that personal mobile devices can be used in the workplace to enhance convenience and flexibility. This development encourages organizations to allow access of personal mobile devices to business information and systems for businesses operation. However, BYOD opens a firm to various security risks such as data contamination and the exposure of user interest to criminal activities. Mobile devices were not designed to handle intense data security and advanced security features are frequently turned off. Using personal mobile devices can also expose a system to various forms of security threats like malware. …


A Journey To The Adic World, Fayadh Kadhem Jan 2018

A Journey To The Adic World, Fayadh Kadhem

Electronic Theses and Dissertations

The first idea of this research was to study a topic that is related to both Algebra and Topology and explore a tool that connects them together. That was the entrance for me to the “adic world”. What was needed were some important concepts from Algebra and Topology, and so they are treated in the first two chapters.

The reader is assumed to be familiar with Abstract Algebra and Topology, especially with Ring theory and basics of Point-set Topology.

The thesis consists of a motivation and four chapters, the third and the fourth being the main ones. In the third …


Survey Of Results On The Schrodinger Operator With Inverse Square Potential, Richardson Saint Bonheur Jan 2018

Survey Of Results On The Schrodinger Operator With Inverse Square Potential, Richardson Saint Bonheur

Electronic Theses and Dissertations

In this paper we present a survey of results on the Schrodinger operator with Inverse ¨ Square potential, La= −∆ + a/|x|^2 , a ≥ −( d−2/2 )^2. We briefly discuss the long-time behavior of solutions to the inter-critical focusing NLS with an inverse square potential(proof not provided). Later we present spectral multiplier theorems for the operator. For the case when a ≥ 0, we present the multiplier theorem from Hebisch [12]. The case when 0 > a ≥ −( d−2/2 )^2 was explored in [1], and their proof will be presented for completeness. No improvements on the sharpness …


Multiclass Classification Using Support Vector Machines, Duleep Prasanna W. Rathgamage Don Jan 2018

Multiclass Classification Using Support Vector Machines, Duleep Prasanna W. Rathgamage Don

Electronic Theses and Dissertations

In this thesis, we discuss different SVM methods for multiclass classification and introduce the Divide and Conquer Support Vector Machine (DCSVM) algorithm which relies on data sparsity in high dimensional space and performs a smart partitioning of the whole training data set into disjoint subsets that are easily separable. A single prediction performed between two partitions eliminates one or more classes in a single partition, leaving only a reduced number of candidate classes for subsequent steps. The algorithm continues recursively, reducing the number of classes at each step until a final binary decision is made between the last two classes …


Some New And Generalized Distributions Via Exponentiation, Gamma And Marshall-Olkin Generators With Applications, Hameed Abiodun Jimoh Jan 2018

Some New And Generalized Distributions Via Exponentiation, Gamma And Marshall-Olkin Generators With Applications, Hameed Abiodun Jimoh

Electronic Theses and Dissertations

Three new generalized distributions developed via completing risk, gamma generator, Marshall-Olkin generator and exponentiation techniques are proposed and studied. Structural properties including quantile functions, hazard rate functions, moment, conditional moments, mean deviations, R\'enyi entropy, distribution of order statistics and maximum likelihood estimates are presented. Monte Carlo simulation is employed to examine the performance of the proposed distributions. Applications of the generalized distributions to real lifetime data are presented to illustrate the usefulness of the models.


Application Of Evolutionary Network Concept In Structuring Mathematics Curriculum, Aditi Mitra Jan 2018

Application Of Evolutionary Network Concept In Structuring Mathematics Curriculum, Aditi Mitra

Electronic Theses and Dissertations

Phylogenetic tree and in general, evolutionary network, has found its application well beyond the biological fields and has even percolated into recent high demanding areas, such as data mining and social media chain reactions. An extensive survey of its current applications are presented here. An attempt has been made to apply the very concept in the mathematics course curriculum inside a degree program. Various features of the tree structure are identified within the curriculum network. To highlight various key components and to enhance the visual effect, several diagrams are presented. The combined effect of these diagram provides a sense of …


Producing Smooth Flow In Atom Circuits By Stirring, Olatunde Oladehin Jan 2018

Producing Smooth Flow In Atom Circuits By Stirring, Olatunde Oladehin

Electronic Theses and Dissertations

We studied how smooth flow can be produced by stirring an ultracold atom circuit consisting of a gaseous Bose--Einstein condensate (BEC) confined in a ``racetrack'' potential. The racetrack potential was made up of two straight parallel channels of length L connected on both ends by semicircular channels of the same width and (energy) depth as the straightaways. We used the Gross--Pitaevskii equation to simulate the behavior of the BEC in this potential when stirred by a rectangular paddle at various speeds and barrier heights. We found that smooth flow could be produced and conducted a systematic study of the flow …


Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher Jan 2018

Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher

Electronic Theses and Dissertations

Through-out military history, the need to safely and effectively allocate resources to various military operations was a task of extreme importance. Satisfying the needs of multiple consumers by optimally pairing with appropriate suppliers falls into the category of vehicle routing problems (VRP), which has been intensively studied over the years. In general, finding the optimal solution to VRP is known to be NP-hard. The proposed solutions rely on mathematical programming and the size of the problems that can be optimally solved is typically limited. In military settings, balancing the needs of multiple consumers with the current operational environment has always …


Old English Character Recognition Using Neural Networks, Sattajit Sutradhar Jan 2018

Old English Character Recognition Using Neural Networks, Sattajit Sutradhar

Electronic Theses and Dissertations

Character recognition has been capturing the interest of researchers since the beginning of the twentieth century. While the Optical Character Recognition for printed material is very robust and widespread nowadays, the recognition of handwritten materials lags behind. In our digital era more and more historical, handwritten documents are digitized and made available to the general public. However, these digital copies of handwritten materials lack the automatic content recognition feature of their printed materials counterparts. We are proposing a practical, accurate, and computationally efficient method for Old English character recognition from manuscript images. Our method relies on a modern machine learning …


Cellulose Modification For Use As Reinforcement In Bio-Based Composites, Ashley L. Rudolph Jan 2018

Cellulose Modification For Use As Reinforcement In Bio-Based Composites, Ashley L. Rudolph

Electronic Theses and Dissertations

The goal of the research contained in this thesis is to provide an alternative method of developing polymers than the current petroleum-based polymeric products. Vegetable oil-based polymers are a popular alternative due to their low-cost and low toxicity. The carbon-carbon double bonds in the oil are ideal reactive sites for a free radical polymerization. Cellulose is a naturally occurring polymer. Modifying cellulose prior to making composites with tung oil allows a hydrophilic material to mix better with a hydrophobic resin. Vegetable oil-based polymers usually require the reinforcement of fibers to enhance the thermo-mechanical properties that would replace petroleum-based polymers. In …


Exploring New Synthetic Strategies By Using Novel Manganese Carboxylate Complexes Along With Two Alkoxide Based Ligands, 2-(Hydroxymethyl)-Pyridine And 4,5-Bis(Hydroxymethyl)-2-Methylpyridin-3-Ol In The Area Of Polynuclear Coordination Chemistry, Michael A. Reagan Jan 2018

Exploring New Synthetic Strategies By Using Novel Manganese Carboxylate Complexes Along With Two Alkoxide Based Ligands, 2-(Hydroxymethyl)-Pyridine And 4,5-Bis(Hydroxymethyl)-2-Methylpyridin-3-Ol In The Area Of Polynuclear Coordination Chemistry, Michael A. Reagan

Electronic Theses and Dissertations

Manganese carboxylate complexes have been well studied in the past, due to their relevance in bioinorganic chemistry and as well as their behavior as nanoscale magnetic materials that is called single-molecule magnets (SMMs). SMMs are special class of magnetic materials in which magnetism is intrinsic to the molecule. Polynuclear manganese clusters often possess high spin ground states as well as large and negative magnetoanisotropy, a combination which leads to an energy barrier for the reversal of the magnetization direction. The paramagnetic nature of manganese at its common oxidation states with an ample number of unpaired electrons often leads to high-nuclearity …


A Survey Of Clustering Analysis And Clustering Analysis In Graphs, Raven D. Gilmore Jan 2018

A Survey Of Clustering Analysis And Clustering Analysis In Graphs, Raven D. Gilmore

Electronic Theses and Dissertations

Clustering analysis is an important topic in data mining, where data points that are similar to each other are grouped together. Graph clustering deals with clustering analysis of data points that correspond to vertices on a graph. We first survey some most well known algorithms for clustering analysis. Then for graph clustering we note that one of the fundamental factors is the distance measure between vertices. We further examine various known venues for defining such measures and propose some others.


A Comparison Of Bridge Deterioration Models, Toktam Naderimoghaddam Jan 2018

A Comparison Of Bridge Deterioration Models, Toktam Naderimoghaddam

Electronic Theses and Dissertations

Predicting how bridges will deteriorate is the key to budgeting financial and personnel resources. Deterioration models exist for specific components of a bridge, but no models exist for the sufficiency rating which is an overall measure of the condition and relevance of a bridge used for determining eligibility for federal funds.

We have 25 years worth of data collected by the Georgia Department of Transportation from 1992 to 2016 about all bridges in the State of Georgia. More precisely, each row in this data set includes the characteristics of each bridge along with the sufficiency rating of that bridge in …


Blow Up Solution Of Bose-Einstein Condensates With Anisotropic Trapping Potential And Rotation, Christopher Leonard Jan 2018

Blow Up Solution Of Bose-Einstein Condensates With Anisotropic Trapping Potential And Rotation, Christopher Leonard

Electronic Theses and Dissertations

In this paper we will analyze a nonlinear Schrodinger equation with quadratic anisotropic trapping potential used to describe a Bose-Einstein condensate. We will find sufficient condition for the global existence of the solution and for the blow up result using physical properties associated to the equation such as the mass, energy, and angular momentum along with some other identities related to the equation. We will finish the thesis with showing some graphical representations describing the solution of the equation.


Examining The Issue Of Compliance With Personal Protective Equipment Among Wastewater Workers Across The Southeast Region Of The United States, Tamara L. Wright Jan 2018

Examining The Issue Of Compliance With Personal Protective Equipment Among Wastewater Workers Across The Southeast Region Of The United States, Tamara L. Wright

Electronic Theses and Dissertations

Wastewater workers are exposed to different occupational hazards such as chemicals, gases, viruses, and bacteria. Personal Protective Equipment (PPE) is a significant factor that can reduce or increase the probability of an accident from hazardous exposures to chemicals and microbial contaminants. The purpose of this study was to identify wastewater worker’s beliefs and practices on wearing PPE and protections offered by PPE through the integration of the Health Belief Model (HBM). Participants were workers in the wastewater industry, which included wastewater operators, laboratory analysts, maintenance workers, wastewater collection workers, equipment operators, managers, and supervisors (n=272). The instrument was a self-administered …


Mchm (4-Methylcyclohexane Methanol) Influences The Predator-Prey Interaction Between Danio Rerio And Daphnia Magna, Anna C. Wagner Jan 2018

Mchm (4-Methylcyclohexane Methanol) Influences The Predator-Prey Interaction Between Danio Rerio And Daphnia Magna, Anna C. Wagner

Electronic Theses and Dissertations

Chemical contamination alters organism-level traits, such as activity and feeding, that can ultimately affect aquatic trophic interactions. Despite the importance of predator-prey relationships in aquatic communities, chemical toxicity is often tested on single species prior to use. For example, 4-methylcyclohexane methanol (MCHM) used in industrial coal-cleaning enters the environment regularly from low-level contamination during disposal and occasionally in high concentrations following accidental spills, but its effects on fish-zooplankton interactions remain unknown. It was hypothesized MCHM exposure affects zebrafish and D. magna swimming behavior differently when exposed individually or together, and ultimately affects their relationship. Zebrafish and D. magna were exposed …