Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae Dec 2005

Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae

Theses and Dissertations

Today, it is becoming increasingly clear that there is a growing interest, concern, and need for technological literacy. To this end, the International Technology Education Association (ITEA) through the Technology for All Americans Project, has developed and promulgated the Standards for Technological Literacy: Content for the Study of Technology. This effort is part of the ongoing initiative to develop technology standards on a national level, and to focus on what every student in grades K-12 should know and be able to do in order to achieve technological literacy (ITEA, 2000). The purpose of this study was to investigate the perceived …


Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker Nov 2005

Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker

Theses and Dissertations

Clinical trials are important to the advancement of medical science. They provide the experimental and statistical basis needed to determine the benefit of diagnostic and therapeutic agents and procedures. The more patients enrolled in a clinical trial, the more confidence we can have in the trial's results. However, current practices for identifying eligible patients can be expensive and time-consuming. To assist in making identification of eligible patients more cost effective, we have developed a system for translating the eligibility criteria for clinical trials to an executable form. This system takes as input the eligibility criteria for a trial formatted as …


Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green Jul 2005

Establishing Public Confidence In The Viability Of Fingerprint Biometric Technology, Nathan Alan Green

Theses and Dissertations

The most common personal authentication techniques used for identity management employ a secret PIN or password that must be remembered. The challenge, for a given user, is that a multitude of such codes must be recalled over the course of the day for transactions involving distinct computer applications. Password mania prevails. Fingerprint biometric technology is an ideal alternate solution to this password recall problem. In spite of their availability for nearly thirty years, fingerprint biometric systems still remain uncommon in public sectors of industry such as education, government, and technology. Technology has improved sufficiently that false acceptance and rejection rates …


Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel Mar 2005

Assessing The Usefulness Of Visualization Tools To Investigate Hidden Patterns With Insider Attack Cases, Amy M. Rammel

Theses and Dissertations

The insider threat is a major concern for organizations. Open markets, technological advances, and the evolving definition of employee have exacerbated the insider threat. Insider threat research efforts are focusing on both prevention and detection techniques. However, recent security violation trends highlight the damage insider attacks cause organizations and illuminate why organizations and researchers must develop new approaches to this challenge. Although fruitful research is being conducted and new technologies are being applied to the insider threat problem, companies remain susceptible to the costly damage generated by insider threat actions. This research explored how visualization tools may be useful in …


Passwords: A Survey On Usage And Policy, Kurt W. Martinson Mar 2005

Passwords: A Survey On Usage And Policy, Kurt W. Martinson

Theses and Dissertations

Computer password use is on the rise. Passwords have become one of the primary authentication methods used today. It is because of their high use that organizations have started to place parameters on passwords. Are password restrictions a nuisance? What are some of the consequences that result as organizations place the burden of their computer security on passwords? This thesis analyzes the results of a survey instrument that was used to determine if individuals are using similar techniques or patterns when choosing or remembering their passwords. It also looks at how individuals feel about using passwords. In addition, the authors …


Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee Mar 2005

Efficient Generation Of Social Network Data From Computer-Mediated Communication Logs, Jason Wei Sung Yee

Theses and Dissertations

The insider threat poses a significant risk to any network or information system. A general definition of the insider threat is an authorized user performing unauthorized actions, a broad definition with no specifications on severity or action. While limited research has been able to classify and detect insider threats, it is generally understood that insider attacks are planned, and that there is a time period in which the organization's leadership can intervene and prevent the attack. Previous studies have shown that the person's behavior will generally change, and it is possible that social network analysis could be used to observe …


Fuzzy Membership Function Initial Values: Comparing Initialization Methods That Expedite Convergence, Stephanie Scheibe Lee Jan 2005

Fuzzy Membership Function Initial Values: Comparing Initialization Methods That Expedite Convergence, Stephanie Scheibe Lee

Theses and Dissertations

Fuzzy attributes are used to quantify imprecise data that model real world objects. To effectively use fuzzy attributes, a fuzzy membership function must be defined to provide the boundaries for the fuzzy data. The initialization of these membership function values should allow the data to converge to a stable membership value in the shortest time possible. The paper compares three initialization methods, Random, Midpoint and Random Proportional, to determine which method optimizes convergence. The comparison experiments suggest the use of the Random Proportional method.