Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Medicine and Health Sciences

Ontogenetic Scaling Patterns And Functional Anatomy Of The Pelvic Limb Musculature In Emus (Dromaius Novaehollandiae), Luis P. Lamas, Russell P. Main, John R. Hutchinson Dec 2014

Ontogenetic Scaling Patterns And Functional Anatomy Of The Pelvic Limb Musculature In Emus (Dromaius Novaehollandiae), Luis P. Lamas, Russell P. Main, John R. Hutchinson

Department of Basic Medical Sciences Faculty Publications

Emus (Dromaius novaehollandiae) are exclusively terrestrial, bipedal and cursorial ratites with some similar biomechanical characteristics to humans. Their growth rates are impressive, as their body mass increases eighty-fold from hatching to adulthood whilst maintaining the same mode of locomotion throughout life. These ontogenetic characteristics stimulate biomechanical questions about the strategies that allow emus to cope with their rapid growth and locomotion, which can be partly addressed via scaling (allometric) analysis of morphology. In this study we have collected pelvic limb anatomical data (muscle architecture, tendon length, tendon mass and bone lengths) and calculated muscle physiological cross sectional area …


Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu Dec 2014

Privacy-Preserving And Outsourced Multi-User K-Means Clustering, Bharath Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dangxi Liu

Cyber Center Publications

Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources. As a result, such entities may want to refrain from participating in the PPDM process. To overcome this issue and to take many other benefits of cloud computing, outsourcing PPDM tasks to the cloud environment has recently gained special attention. We consider the scenario where n entities outsource their databases (in encrypted format) to the cloud and ask the cloud to perform the clustering task on their …


Misalignments: Challenges In Cultivating Science Faculty With Education Specialties In Your Department, Seth D. Bush, Nancy Pelaez, James A. Rudd Ii, Michael T. Stevens, Kimberly D. Tanner, Kathy S. Williams Dec 2014

Misalignments: Challenges In Cultivating Science Faculty With Education Specialties In Your Department, Seth D. Bush, Nancy Pelaez, James A. Rudd Ii, Michael T. Stevens, Kimberly D. Tanner, Kathy S. Williams

PIBERG Publications

Science Faculty with Education Specialties (SFES) are increasingly being hired across the United States. However, little is known about the motivations for SFES hiring or the potential or actual impact of SFES. In the context of a recent national survey of US SFES, we investigated SFES perceptions about these issues. Strikingly, perceptions about reasons for hiring SFES were poorly aligned with perceptions about potential and actual contributions reported by SFES themselves, and the advice they extended to beginning SFES was varied. While preparation of future teachers and departmental teaching needs were common reasons offered for SFES hiring, the potential and …


Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino Nov 2014

Poster: Protecting Against Data Exfiltration Insider Attacks Through Application Programs, Asmaa Mohamed Sallama, Elisa Bertino

Cyber Center Publications

In this paper, we describe a system that distinguishes be- tween legitimate and malicious database transactions per- formed by application programs. Our system is particularly useful for protecting against code-modification attacks performed by insiders who have access to and can change the programs' source code to make them execute different queries than those they are expected to execute. Our system works with any type of DBMS and requires minimum modification to application programs.


Quantitative Modeling Of Spatiotemporal Systems: Simulation Of Biological Systems And Analysis Of Error Metric Effects On Model Fitting, James Hengenius Oct 2014

Quantitative Modeling Of Spatiotemporal Systems: Simulation Of Biological Systems And Analysis Of Error Metric Effects On Model Fitting, James Hengenius

Open Access Dissertations

Understanding the biophysical processes underlying biological and biotechnological processes is a prerequisite for therapeutic treatments and technological innovation. With the exponential growth of computational processing speed, experimental findings in these fields have been complemented by dynamic simulations of developmental signaling and genetic interactions. Models provide means to evaluate "emergent" properties of systems sometimes inaccessible by reductionist approaches, making them test beds for biological inference and technological refinement.^ The complexity and interconnectedness of biological processes pose special challenges to modelers; biological models typically possess a large number of unknown parameters relative to their counterparts in other physical sciences. Estimating these parameter …


Evaluation Of Yttrium-90 Positron Emission Tomography Dosimetry, Katherine N. Tapp Oct 2014

Evaluation Of Yttrium-90 Positron Emission Tomography Dosimetry, Katherine N. Tapp

Open Access Dissertations

Purpose: Radioembolization is a novel treatment which utilizes the liver's unique dual system blood supply to trap yttrium-90 (90Y) microspheres in microvasculature near liver tumors. Radioembolization dose planning and dosimetry are based on crude, inaccurate assumptions due to the lack of knowledge of patient specific 90Y microsphere distribution. In recent years, the very small 3.1867e-5 internal pair production decay branch of 90Y has been shown to allow for positron emission tomography (PET) imaging following radioembolization. This work explores the accuracy and limitation of 90Y PET imaging due to the extremely low signal to noise (SNR) …


Structured Deterministic Models Applied To Malaria And Other Endemic Diseases, Katia Patricia Vogt Geisse Oct 2014

Structured Deterministic Models Applied To Malaria And Other Endemic Diseases, Katia Patricia Vogt Geisse

Open Access Dissertations

This thesis includes modeling studies on three structured deterministic models. These models are used to study the disease dynamics of malaria or the joint disease dynamics of HIV and HSV-2. Each of the models includes multiple components containing individuals in various epidemiological classes for the purpose of addressing questions that are of interests to biologists and epidemiologists. Some of the compartments have a continuous age-structure, which is necessary for studying the specific biological questions under investigation.^ In Chapter 2 a chronological-age structured deterministic model for malaria is presented. The model includes the human and mosquito populations with the human population …


An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino Sep 2014

An Efficient Certificateless Encryption For Secure Data Sharing In Public Clouds, Seung-Hyun Seo, Mohamed Yoosuf Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino

Cyber Center Publications

We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive …


Using The Microsoft Kinect To Assess Human Bimanual Coordination, Joshua James Liddy Jul 2014

Using The Microsoft Kinect To Assess Human Bimanual Coordination, Joshua James Liddy

Open Access Theses

Optical marker-based systems are the gold-standard for capturing three-dimensional (3D) human kinematics. However, these systems have various drawbacks including time consuming marker placement, soft tissue movement artifact, and are prohibitively expensive and non-portable. The Microsoft Kinect is an inexpensive, portable, depth camera that can be used to capture 3D human movement kinematics. Numerous investigations have assessed the Kinect's ability to capture postural control and gait, but to date, no study has evaluated it's capabilities for measuring spatiotemporal coordination. In order to investigate human coordination and coordination stability with the Kinect, a well-studied bimanual coordination paradigm (Kelso, 1984, Kelso; Scholz, & …


Investigation Into The Control Of Melittin Secondary Structure And Antimicrobial Activity, Zachary B. Molinets Jul 2014

Investigation Into The Control Of Melittin Secondary Structure And Antimicrobial Activity, Zachary B. Molinets

Open Access Theses

Antimicrobial resistance has been an exponentially growing problem since the discovery of antibiotics. Antibiotics have been misused for many years and this misuse has grown into a real problem for the medical community. While there are countless safeguards to prevent infection by a resistant strain of bacteria, there are still many plagued by it and must be treated with sometimes dangerous antibiotics. Melittin, along with many other peptides, contain potent antimicrobial properties, but are also toxic toward enthrocytes. The control of the secondary structure of peptides provides the key to adjusting their activity.


Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock Jun 2014

Draft Genome Sequence Of Acetobacter Aceti Strain 1023, A Vinegar Factory Isolate, John Hung, Christopher Mill, Sandra Clifton, Vincent Magrini, Ketaki Bhide, Julie Francois, Aaron Ransome, Lucinda Fulton, Jyothi Thimmapuram, Richard Wilson, T. Joseph Kappock

Cyber Center Publications

The genome sequence of Acetobacter aceti 1023, an acetic acid bacterium adapted to traditional vinegar fermentation, comprises 3.0 Mb (chromosome plus plasmids). A. aceti 1023 is closely related to the cocoa fermenter Acetobacter pasteurianus 386B but possesses many additional insertion sequence elements.


Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl Jun 2014

Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl

Charleston Library Conference

The authors consider trends in mobile device usage for the Internet as a whole, for EBSCO Discovery Service across all client libraries, and at two specific libraries: Preston Medical Library, serving the University of Tennessee (UT) Graduate School of Medicine and UT Medical Center, and the Joyner Library at East Carolina University, serving students and faculty on the main campus. Librarians at Preston Medical Library conducted a survey to determine which mobile devices, platforms, and apps were used by their patrons in 2012. East Carolina University piloted an iPad and e-reader lending program in 2010–2011. The results of each are …


Metal Stopping Reagents Facilitate Discontinuous Activity Assays Of The De Novo Purine Biosynthesis Enzyme Pure, Kelly L. Sullivan, Loredana C. Huma, Elwood Mullins, Michael E. Johnson, T. Joseph Kappock May 2014

Metal Stopping Reagents Facilitate Discontinuous Activity Assays Of The De Novo Purine Biosynthesis Enzyme Pure, Kelly L. Sullivan, Loredana C. Huma, Elwood Mullins, Michael E. Johnson, T. Joseph Kappock

Department of Biochemistry Faculty Publications

The conversion of 5-aminoimidazole ribonucleotide (AIR) to 4-carboxy-AIR (CAIR) represents an unusual divergence in purine biosynthesis: microbes and nonmetazoan eukaryotes use class I PurEs while animals use class II PurEs. Class I PurEs are therefore a potential antimicrobial target; however, no enzyme activity assay is suitable for high throughput screening (HTS). Here we report a simple chemical quench that fixes the PurE substrate/product ratio for 24 h, as assessed by the Bratton-Marshall assay (BMA) for diazotizable amines. The ZnSO4 stopping reagent is proposed to chelate CAIR, enabling delayed analysis of this acid-labile product by BMA or other HTS methods


A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy May 2014

A Practical Approach For Provenance Transmission In Wireless Sensor Networks, S.M. Iftekharul Alam, Sonia Fahmy

Cyber Center Publications

Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality assurance. Trust evaluation frameworks utilize data provenance along with the sensed data values to compute the trustworthiness of each data item. However, in a sizeable multi-hop sensor network, provenance information requires a large and variable number of bits in each packet, resulting in high energy dissipation due to the extended period of radio communication. In this paper, we design energy-efficient provenance encoding and construction schemes, which we refer to as Probabilistic Provenance Flow (PPF). Our work demonstrates the feasibility of adapting the Probabilistic Packet Marking …


Pharmaceuticals And Personal Care Products: Emerging Contaminants In Aquatic Ecosystems, Jenny E. Zenobio Apr 2014

Pharmaceuticals And Personal Care Products: Emerging Contaminants In Aquatic Ecosystems, Jenny E. Zenobio

Open Access Theses

In recent years, the presence of pharmaceuticals and personal care products (PPCPs) in aquatic systems has led to research on their fate and effects. PPCPs have been found in mixture in wastewater effluents, surface, ground, and drinking water at low concentrations from areas of intense urbanization. Although adverse effects to human health from the current environmental concentrations are unlikely, the impacts to ecological receptors are not clear. We performed field and laboratory studies to quantify and evaluate effects of PPCPs on fish. First, a field study was conducted at the Baca National Wildlife Refuge, Colorado (2010-2012) because a portion of …


Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor Mar 2014

Security Of Graph Data: Hashing Schemes And Definitions, Muhammad U. Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor

Cyber Center Publications

Use of graph-structured data models is on the rise - in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing schemes and show them they are efficient. The widely used Merkle hash technique is not suitable as it is, because graphs may be directed acyclic ones or cyclic ones. In this paper, we are addressing this problem. Our contributions are: (1) define the practical and formal security model of …


Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino Feb 2014

Randomized And Efficient Authentication In Mobile Environments, Wei Jiang, Dan Lin, Feng Li, Elisa Bertino

Cyber Center Publications

In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these applications is the security and privacy concerns raised regarding the mobile users. In that, a malicious user or service provider can track the locations of a user traveled so that other malicious act can be carried out more effectively against the user. Therefore, …


Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino Jan 2014

Identidroid: Android Can Finally Wear Its Anonymous Suit, Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino

Cyber Center Publications

Because privacy today is a major concern for mobile applications, network anonymizers are widely available on smartphones, such as Android. However despite the use of such anonymizers, in many cases applications are still able to identify the user and the device by different means than the IP address. The reason is that very often applications require device services and information that go beyond the capabilities of anonymous networks in protecting users’ identity and privacy. In this paper, we propose two solutions that address this problem. The first solution is based on an approach that shadows user and application data, device …


Dj-1 And Atp13a2: Two Proteins Involved In Parkinson’S Disease, Josephat M Asiago Jan 2014

Dj-1 And Atp13a2: Two Proteins Involved In Parkinson’S Disease, Josephat M Asiago

Open Access Dissertations

Parkinson's disease (PD) is the second most common neurodegenerative disorder after Alzheimer's disease, affecting approximately 0.3% of the total U.S. population, and its prevalence increases with age. Two neuropathological hallmarks of PD are the loss of dopaminergic neurons in the substantia nigra pars compacta, a region in the midbrain involved in initiating and sustaining movement, and the presence of cytosolic inclusions called Lewy bodies (LBs) in various brain regions. LBs are enriched with fibrillar forms of the presynaptic protein &agr;-synuclein (aSyn). Two autosomal recessive genes implicated in familial PD are PARK9, encoding the P-type ATPase ATP13A2, a lysosomal ATPase; and …