Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Applying Ahp And Clustering Approaches For Public Transportation Decisionmaking: A Case Study Of Isfahan City, Alireza Salavati, Hossein Haghshenas, Bahador Ghadirifaraz, Jamshid Laghaei, Ghodrat Eftekhari Dec 2016

Applying Ahp And Clustering Approaches For Public Transportation Decisionmaking: A Case Study Of Isfahan City, Alireza Salavati, Hossein Haghshenas, Bahador Ghadirifaraz, Jamshid Laghaei, Ghodrat Eftekhari

Journal of Public Transportation

The main purpose of this paper is to define appropriate criteria for the systematic approach to evaluate and prioritize multiple candidate corridors for public transport investment simultaneously to serve travel demand, regarding supply of current public transportation system and road network conditions of Isfahan, Iran. To optimize resource allocation, policymakers need to identify proper corridors to implement a public transportation system. In fact, the main question is to adopt the best public transportation system for each main corridor of Isfahan. In this regard, 137 questionnaires were completed by experts, directors, and policymakers of Isfahan to identify goals and objectives in …


Towards Computational Human Behavior Modeling For Just-In-Time Adaptive Interventions, Tylar Murray Nov 2016

Towards Computational Human Behavior Modeling For Just-In-Time Adaptive Interventions, Tylar Murray

USF Tampa Graduate Theses and Dissertations

The advent of powerful wearable devices and smartphones has enabled a new generation of “in-the-wild” user studies, adaptive behavioral intervention strategies, and context measurement. Though numerous proof-of-concept studies continue to push the limitations of what a behavioral scientist can do with these technologies, there remains a major methodological roadblock separating behavioral theory and application. Avatar-user interaction theory, for example, is not well defined in its formulation, and thus guidelines for intervention designers depend on heuristic methods and designer intuition. Computational modeling has been slow to move into behavioral science in general, but a growing population of behavioral scientists recognize this …


Oversampling Methods For Imbalanced Dataset Classification And Their Application To Gynecological Disorder Diagnosis, Iman Nekooeimehr Jun 2016

Oversampling Methods For Imbalanced Dataset Classification And Their Application To Gynecological Disorder Diagnosis, Iman Nekooeimehr

USF Tampa Graduate Theses and Dissertations

In many applications, the dataset for classification may be highly imbalanced where most of the instances in the training set may belong to some of the classes (majority classes), while only a few instances are from the other classes (minority classes). Conventional classifiers will strongly favor the majority class and ignore the minority instances. The imbalance problem can occur in both binary data classification and also in ordinal regression. Ordinal regression is a supervised approach for learning the ordinal relationship between classes. Extensive research has been performed for addressing imbalanced datasets for binary classification; however, current methods do not address …


Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam Jun 2016

Enforcing Security Policies On Gpu Computing Through The Use Of Aspect-Oriented Programming Techniques, Bader Albassam

USF Tampa Graduate Theses and Dissertations

This thesis presents a new security policy enforcer designed for securing parallel computation on CUDA GPUs. We show how the very features that make a GPGPU desirable have already been utilized in existing exploits, fortifying the need for security protections on a GPGPU. An aspect weaver was designed for CUDA with the goal of utilizing aspect-oriented programming for security policy enforcement. Empirical testing verified the ability of our aspect weaver to enforce various policies. Furthermore, a performance analysis was performed to demonstrate that using this policy enforcer provides no significant performance impact over manual insertion of policy code. Finally, future …


Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal Apr 2016

Design Exploration And Application Of Reversible Circuits In Emerging Technologies, Saurabh Kotiyal

USF Tampa Graduate Theses and Dissertations

The reversible logic has promising applications in emerging computing paradigms, such as quantum computing, quantum dot cellular automata, optical computing, etc. In reversible logic gates, there is a unique one-to-one mapping between the inputs and outputs. To generate a useful gate function, the reversible gates require some constant ancillary inputs called ancilla inputs. Also to maintain the reversibility of the circuits some additional unused outputs are required that are referred to as the garbage outputs. The number of ancilla inputs, the number of garbage outputs and quantum cost plays an important role in the evaluation of reversible circuits. Thus minimizing …