Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Missouri University of Science and Technology

2011

Keyword
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

Investigating Combinatorial Approaches In Virtual Screening On Human Inducible 6-Phosphofructo-2-Kinase/Fructose-2,6-Bisphosphatase (Pfkfb3): A Case Study For Small Molecule Kinases, Robert B. Crochet, Michael C. Cavalier, Minsuh Seo, Jeong Do Kim, Young Sun Yim, Seung Jong Park, Yong Hwan Lee Nov 2011

Investigating Combinatorial Approaches In Virtual Screening On Human Inducible 6-Phosphofructo-2-Kinase/Fructose-2,6-Bisphosphatase (Pfkfb3): A Case Study For Small Molecule Kinases, Robert B. Crochet, Michael C. Cavalier, Minsuh Seo, Jeong Do Kim, Young Sun Yim, Seung Jong Park, Yong Hwan Lee

Computer Science Faculty Research & Creative Works

Efforts toward improving the predictiveness in tier-based approaches to virtual screening (VS) have mainly focused on protein kinases. Despite their significance as drug targets, small molecule kinases have been rarely tested with these approaches. In this paper, we investigate the efficacy of a pharmacophore screening-combined structure-based docking approach on the human inducible 6-phosphofructo-2-kinase/fructose-2,6-bisphosphatase, an emerging target for cancer chemotherapy. Six out of a total 1364 compounds from NCI's Diversity Set II were selected as true actives via throughput screening. Using a database constructed from these compounds, five programs were tested for structure-based docking (SBD) performance, the MOE of which showed …


An Engineered Approach To Stem Cell Culture: Automating The Decision Process For Real-Time Adaptive Subculture Of Stem Cells, Dai Fei Elmer Ker, Lee E. Weiss, Silvina N. Junkers, Mei Chen, Zhaozheng Yin, Mike F. Sandbothe, Seungil Huh, Sungeun Eom, Ryoma Bise, Elvira Osuna-Highley, Takeo Kanade, Phil Gordon Campbell Nov 2011

An Engineered Approach To Stem Cell Culture: Automating The Decision Process For Real-Time Adaptive Subculture Of Stem Cells, Dai Fei Elmer Ker, Lee E. Weiss, Silvina N. Junkers, Mei Chen, Zhaozheng Yin, Mike F. Sandbothe, Seungil Huh, Sungeun Eom, Ryoma Bise, Elvira Osuna-Highley, Takeo Kanade, Phil Gordon Campbell

Computer Science Faculty Research & Creative Works

Current cell culture practices are dependent upon human operators and remain laborious and highly subjective, resulting in large variations and inconsistent outcomes, especially when using visual assessments of cell confluency to determine the appropriate time to subculture cells. Although efforts to automate cell culture with robotic systems are underway, the majority of such systems still require human intervention to determine when to subculture. Thus, it is necessary to accurately and objectively determine the appropriate time for cell passaging. Optimal stem cell culturing that maintains cell pluripotency while maximizing cell yields will be especially important for efficient, cost-effective stem cell-based therapies. …


Plastic Packaging: A Current Perspective On Sustainability, Shristy Bashyal, Bonnie Bachman, Margaret H. Baumann Jan 2011

Plastic Packaging: A Current Perspective On Sustainability, Shristy Bashyal, Bonnie Bachman, Margaret H. Baumann

Business and Information Technology Faculty Research & Creative Works

Packaging producers, machine manufacturers, and/or resin manufacturers are studied to conduct case study research to assess the issues they are facing with regard to “sustainability”. This industry viewpoint is conducted to generate information regarding environmental pressures facing these companies and the resulting strategies employed to be competitive and sustainable. To collect the necessary information about these selected companies and the overall industry point of view they represent, direct interview techniques are used.


Location Privacy Policy Management System, Arej Awodha Muhammed Jan 2011

Location Privacy Policy Management System, Arej Awodha Muhammed

Masters Theses

"The advance in wireless communication and positioning systems has permitted development of a large variety of location-based services that, for example, can help people easily locate family members or find nearest gas station or restaurant. As location-based services become more and more popular, concerns are growing about the misuse of location information by malicious parties. In order to preserve location privacy, many efforts have been devoted to preventing service providers from determining users' exact locations. Few works have sought to help users manage their privacy preferences; however management of privacy is an important issue in real applications. This work developed …


Energy Auditing Proposal, Paul Parham, Bonnie Bachman Jan 2011

Energy Auditing Proposal, Paul Parham, Bonnie Bachman

Business and Information Technology Faculty Research & Creative Works

Executive Summary 1.1 Objectives Develop a business case for an energy audit software application that can be used on portable devices such as the iPad and reduce the time needed to complete an audit report by 50%.


Green Banking, Amy Kalloch, Bonnie Bachman Jan 2011

Green Banking, Amy Kalloch, Bonnie Bachman

Business and Information Technology Faculty Research & Creative Works

Executive Summary Green banking is generally defined as promoting environmentally friendly practices that aid customers in reducing their carbon footprint through their banking operation activities. These practices include such things as online banking, statements, bill payments, and account opening. Banks also invest in internal initiatives to reduce their own carbon footprint. The majority of programs consist of energy efficiency, recycling, ride sharing, and environmentally friendly lending. Banks that support the local community and environment are seen as leaders in this movement. Many online banks and smaller community banks are seen as 'greener' than the large corporate financial institutions. One criticism …


Cross-Layer Design For Network Performance Optimization In Wireless Networks, Xuan Gong Jan 2011

Cross-Layer Design For Network Performance Optimization In Wireless Networks, Xuan Gong

Doctoral Dissertations

"In this dissertation, I use mathematical optimization approach to solve the complex network problems. Paper l and paper 2 first show that ignoring the bandwidth constraint can lead to infeasible routing solutions. A sufficient condition on link bandwidth is proposed that makes a routing solution feasible, and then a mathematical optimization model based on this sufficient condition is provided. Simulation results show that joint optimization models can provide more feasible routing solutions and provide significant improvement on throughput and lifetime. In paper 3 and paper 4, an interference model is proposed and a transmission scheduling scheme is presented to minimize …


Improving Student Learning Outcomes Through Personal Response Systems (Clickers), Ran Cai Jan 2011

Improving Student Learning Outcomes Through Personal Response Systems (Clickers), Ran Cai

Masters Theses

"The main purpose of this research was to examine the impact of Personal Response Systems (PRS) or clickers, (as they are commonly called), on student learning outcome. Student learning outcomes as measured by course grades were compared between traditional lecture format and clicker use lecture format. Student perceptions on clicker use were observed in the mean time. Statistical analysis indicated that although student conveyed positive attitude on clicker adoption, there were no significant differences in course scores between students who used clickers and students who did not.

This study also considered the influence of other factors, such as gender, student …


A Low-Cost Motion Tracking System For Virtual Reality Applications, Abhinav Chadda Jan 2011

A Low-Cost Motion Tracking System For Virtual Reality Applications, Abhinav Chadda

Masters Theses

"This thesis provides an insight into the design and development of a highly effective, low-cost motion tracking system comprised of off-the-shelf (OTS) hardware for virtual reality applications. Present-day motion tracking systems usually have a high cost associated with them. A capable yet affordable OTS motion tracking system is a key enabler to make motion controlled virtual reality an accessible and ubiquitous technology.

The motion tracking system developed in this study is used in conjunction with virtual reality software towards simple and natural human-computer interface solutions. It is developed with the budget of $1,000 per system. The cost includes 2 cameras …


A Social Network Of Service Providers For Trust And Identity Management In The Cloud, Makarand Bhonsle Jan 2011

A Social Network Of Service Providers For Trust And Identity Management In The Cloud, Makarand Bhonsle

Masters Theses

"With the advent of a new paradigm in computing known as Cloud Computing which offers computing as a service, the inflow of a variety of service vendors is increasing constantly. One of the main challenges in this distributed network of service provisioning and deprovisioning system is the end user's privacy. Enforcing authentication and authorization protocols customized to the needs of every service provider evolves to a very intricate Identity Management System with respect to both the collaborating service providers as well as the user. This problem was addressed by the Federated Identity Management systems, where the user information is stored …


Conference Marketing Research For Rolla, Missouri Chamber Of Commerce, Rebecca Mcnally, Bonnie Bachman Jan 2011

Conference Marketing Research For Rolla, Missouri Chamber Of Commerce, Rebecca Mcnally, Bonnie Bachman

Business and Information Technology Faculty Research & Creative Works

This paper is used to give recommendations to the Chamber of Commerce in Rolla, Missouri to help them to better attract conferences and events. A survey given to event planners was the main method used for analyzing what Rolla needs to change to gain more of a name as a conference destination. Although this paper is specific to Rolla, Missouri, the methods used can be imitated for any rural town wishing to attract more conferences.


The History Of Technical Communication Instruction At Missouri University Of Science And Technology: The Evolution Of A Curriculum, Elizabeth Marie Roberson Jan 2011

The History Of Technical Communication Instruction At Missouri University Of Science And Technology: The Evolution Of A Curriculum, Elizabeth Marie Roberson

Masters Theses

"This thesis provides a written record of the history of technical communication instruction at Missouri University of Science and Technology (Missouri S&T). Beginning with the school's inception in 1871 as the Missouri School of Mines and Metallurgy (MSM) through to the year 2005, I have examined course catalogs and department files and conducted interviews to provide an overview of the evolution of technical communication instruction at this institution. To better understand this evolution, I have also provided a framework for the development of the English department from a single course in 1871 to the current Department of English and Technical …


Longitudinal Evaluation Of A Learning System For Teaching Geographical Information System Within The Context Of A Geotechnical Problem, Aparna Sukhavasi Jan 2011

Longitudinal Evaluation Of A Learning System For Teaching Geographical Information System Within The Context Of A Geotechnical Problem, Aparna Sukhavasi

Masters Theses

"A learning system, to train civil engineering students to apply Geographical Information Systems (GIS) in geotechnical problems, was evaluated over a period of 5 years, hence longitudinal. The system was tested with a series of iterations consisting of usability tests and subsequent modification, which were followed by a series of applied evaluations within the context of class lab sessions. The principal goals of this evaluation were to determine the overall effectiveness of the system and the factors that affected student learning. The first evaluation was conducted in 2004; and included a control group that played a "game" related to the …


Assess Commercialization Feasibility Of Algae-Based Bio-Fuel With Dashboard And Scorecard Technologies, Madhur Chopra Jan 2011

Assess Commercialization Feasibility Of Algae-Based Bio-Fuel With Dashboard And Scorecard Technologies, Madhur Chopra

Masters Theses

"The growing energy depleting energy supplies and increasing environmental pollution has motivated researchers across the globe to look for alternative energy sources. Various energy sources have been identified but none of them have the capability of realistically replacing the fossil fuels and meeting the current demand. Algae based bio-fuels give some hope but producing them at large scale is a challenge which needs to be overcome.

The underlying objective of this research project is two folds. Firstly, the project aims to assist with the commercialization of algae based bio-fuels by developing Dashboard based and Balanced Scorecard based monitoring prototypes. The …


Effect Of Web Atmospheric Cues On Users' Emotional Responses In Ecommerce, Tanvi Joginapelly Jan 2011

Effect Of Web Atmospheric Cues On Users' Emotional Responses In Ecommerce, Tanvi Joginapelly

Masters Theses

"The internet has revolutionized the shopping experience. As consumers' emotional responses play an important role in predicting behavioral intentions and satisfaction, it is imperative to study e-commerce from an affective perspective and identify the website design features that influence consumers' emotional responses. This research adopted the stimulus-organism-response (S-O-R) model to examine the effects of web atmospheric cues. mainly vividness and interactivity, on users' emotional responses in e-commerce, and their influence on users' purchasing intentions.

The study had three stages: First, experts in human computer interaction (HCI) were recruited and asked to evaluate and rate 25 different e-commerce websites on interactivity …


Exploring Join Caching In Programming Codes To Reduce Runtime Execution, Swetha Surapaneni Jan 2011

Exploring Join Caching In Programming Codes To Reduce Runtime Execution, Swetha Surapaneni

Masters Theses

"This thesis describes an approach to reduce the runtime of a large program by exploring object querying and query caching in programming codes. Some object-oriented languages allow the programmers to express queries explicitly in the code, which are optimized using the query optimization techniques from the database domain. In this regard, Java Query Language (JQL) has been developed that allows object querying and performs the query optimization and query caching at runtime. The problem that has been addressed in this thesis is how to reduce the runtime of a large program during the single execution by employing an efficient cache …


Comprehensive Evaluation Of A Computer Based Learning System, Arun Sharma Chintalapati Jan 2011

Comprehensive Evaluation Of A Computer Based Learning System, Arun Sharma Chintalapati

Masters Theses

"This thesis presents the results of a comprehensive multi-method evaluation that was conducted on the Rapid Development System (RDS), a computer-based learning environment. The development of the project was funded by a National Science Foundation grant. Prior to this evaluation, the RDS had gone through two iterations.

A pre/post evaluation was conducted using questionnaires and eye tracking. Multi-method evaluation was employed to help triangulate the results and to provide additional insights. Data from the eye tracking was used to study the influence of the RDS interface on the attention and the cognitive workload of students with respect to the learning …


Analyzing Dashboard Performance In Educational, Non-Profit Sectors, Rutuja B. Honnatti Jan 2011

Analyzing Dashboard Performance In Educational, Non-Profit Sectors, Rutuja B. Honnatti

Masters Theses

"Applications of the performance dashboard in the business sector are well documented, but very little research has been performed on its implementation in higher education. The changing economic scenario has exerted pressure on universities to perform to a new standard and achieve their missions and goals. The objective of this research is to investigate if performance management dashboards can be applied to overcome challenges faced by institutions of higher education, such as lack of access to information, stakeholders not taking advantage of what is being offered, students' anxiety about not being able to find a job and strategic planning. A …


Eyes Don't Lie: Understanding Users' First Impressions On Website Design Using Eye Tracking, Sirjana Dahal Jan 2011

Eyes Don't Lie: Understanding Users' First Impressions On Website Design Using Eye Tracking, Sirjana Dahal

Masters Theses

"Websites are becoming more prevalent these days. They need to create a favorable first impression on the users during initial exposure. After allocating their attention to stimuli, users form a cognitive representation of the visual information leading to first impression. Hence, first impression is important to evaluate the effectiveness of a website. This research tries to examine the amount of exposure time needed to form first impression; identify the web design factors that influence the formation of users' first impression; study the emotional responses of users on website design; and finally understand the relationship between first impression and eye movement. …


Pervasive Innovation: Taking Innovation Throughout The Organization, Bonnie Bachman, Stephen O. Bozzone Jan 2011

Pervasive Innovation: Taking Innovation Throughout The Organization, Bonnie Bachman, Stephen O. Bozzone

Business and Information Technology Faculty Research & Creative Works

One of the fundamental tenets of management is that human capital can provide an essential competitive advantage for a business. Pervasive innovation (PI) is a process that blends strategy, structure, process, and culture to elevate product development to new heights and can provide a critical advantage. PI also encompasses new paradigms, practices, methods, and applications that support an environment of creativity and innovation that cuts across organization boundaries, both internal and external boundaries. Pervasive innovation guides the team through the ideation stage to implementation by leveraging the greater collective knowledge of the entire organization. This collaborative approach ensures that the …


Scholarship In International Technical Communication, 1950-1989: A Historical Study, Xiaoyan Huang Jan 2011

Scholarship In International Technical Communication, 1950-1989: A Historical Study, Xiaoyan Huang

Masters Theses

"This thesis is a study of the published scholarship in international technical communication from 1950 to 1989. It provides insight into the four decades' worth of scholarship as well as a resource for the development of present and future scholarship in international technical communication. It attempts to answer the following research questions: What did scholars of international technical communication study in each decade? What are the similarities and differences among the four decades in terms of scholarship in international technical communication? What are the strengths and weaknesses of the relevant scholarship in the four decades? What can we learn from …


Optimization Of Textual Affect Entity Relation Models, Ajith Cherukad Jose Jan 2011

Optimization Of Textual Affect Entity Relation Models, Ajith Cherukad Jose

Masters Theses

"Affective computing is a recent research area in computer science which deals with the design and development of systems that can recognize, interpret and process human affects/emotions. Various research projects in the past have focused on affect sensing and processing raw textual data. One such research effort conducted at the Oak Ridge National Laboratory (ORNL) has introduced an affect propagation algorithm which can generate affective relationships between entities contained in a given textual document. The algorithm depends upon a set of real-valued numeric parameters for which the best possible values are unknown. This thesis describes three different contributions to ORNL's …


Meloc - Memory And Location Optimized Caching For Mobile Ad Hoc Networks, Lekshmi Manian Chidambaram Jan 2011

Meloc - Memory And Location Optimized Caching For Mobile Ad Hoc Networks, Lekshmi Manian Chidambaram

Masters Theses

"The advancement of Mobile ad hoc networks (MANET) is tremendous in the field of social and military applications. Caching and Replication are the two common techniques used to improve data access efficiency in Mobile Ad hoc networks. Caching favors data access efficiency by bringing data closer to the source. Existing caching approaches are deficient in reducing the number of cache locations, thus reducing the number of copies, which is needed for many mission critical applications considering safety and security. Conversely, reducing the number of caches should not affect the efficiency of data access. We design an efficient broker based caching …


Social Network Analysis Of The Video Bloggers' Community In Youtube, Anusha Mogallapu Jan 2011

Social Network Analysis Of The Video Bloggers' Community In Youtube, Anusha Mogallapu

Masters Theses

"This research studied the structure of the social network of the video blogger community on YouTube. It analyzed the social network structure of friends and subscribers of the 187 video bloggers on YouTube and calculated the social network measures. This thesis compares the results to the structure described by Warmbrodt et al. in 2007 and explains the reasons for the distinctions. The number of video bloggers has increased enormously, and the form of their interactions has changed. As a result, the video blogger social network has evolved from a core/periphery structure to one that is centralized. This indicates that the …


An Incentive Based Approach To Detect Selfish Nodes In Mobile P2p Network, Hemanth Meka Jan 2011

An Incentive Based Approach To Detect Selfish Nodes In Mobile P2p Network, Hemanth Meka

Masters Theses

"The growth of mobile devices led to the wide use of Mobile P2P networks. These networks are used in a wide variety of areas and hence there is lot of research in the field of mobile networks. Detecting selfish nodes is one of the research topics triggered due to the popularity of mobile P2P networks. It is necessary to detect selfish nodes in such networks to improve the efficiency of the network. In this thesis, an incentive based approach to detect selfish nodes is designed and evaluated. This approach differs from the existing work as it (i) can be used …


Applying Text Timing In Corporate Spin-Off Disclosure Statement Analysis: Understanding The Main Concerns And Recommendation Of Appropriate Term Weights, Aravindh Sekar Jan 2011

Applying Text Timing In Corporate Spin-Off Disclosure Statement Analysis: Understanding The Main Concerns And Recommendation Of Appropriate Term Weights, Aravindh Sekar

Masters Theses

"Text mining helps in extracting knowledge and useful information from unstructured data. It detects and extracts information from mountains of documents and allowing in selecting data related to a particular data.

In this study, text mining is applied to the 10-12b filings done by the companies during Corporate Spin-off. The main purposes are (1) To investigate potential and/or major concerns found from these financial statements filed for corporate spin-off and (2) To identify appropriate methods in text mining which can be used to reveal these major concerns.

10-12b filings from thirty-four companies were taken and only the "Risk Factors" category …


Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems, Jonathan Joseph Blount Jan 2011

Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems, Jonathan Joseph Blount

Masters Theses

"Efficient and accurate malware detection is increasingly becoming a necessity for society to operate. Existing malware detection systems have excellent performance in identifying known malware for which signatures are available, but poor performance in anomaly detection for zero day exploits for which signatures have not yet been made available or targeted attacks against a specific entity. The primary goal of this thesis is to provide evidence for the potential of learning classier systems to improve the accuracy of malware detection.

A customized system based on a state-of-the-art learning classier system is presented for adaptive rule-based malware detection, which combines a …


A Framework For Transparent Depression Classification In College Settings Via Mining Internet Usage Patterns, Raghavendra Kotikalapudi Jan 2011

A Framework For Transparent Depression Classification In College Settings Via Mining Internet Usage Patterns, Raghavendra Kotikalapudi

Masters Theses

Depression is a serious mental health problem affecting the mind and body of people in our society. As of today, depression affects about 5 to 7% of the American population, which roughly translates to 14 million people! A particularly worrying concern these days is the increasing incidence of depression among college students. The problem is so severe that many US campuses have dedicated centers with mental health professionals catering to students needs. Although there are very effective treatments for depression, studies report that ~80% of depressed students do not seek any help due to the lack of perception of the …


Ceeme: Compensating Events Based Execution Monitoring Enforcement For Cyber-Physical Systems, Thoshitha T. Gamage Jan 2011

Ceeme: Compensating Events Based Execution Monitoring Enforcement For Cyber-Physical Systems, Thoshitha T. Gamage

Doctoral Dissertations

"Fundamentally, inherently observable events in Cyber-Physical Systems with tight coupling between cyber and physical components can result in a confidentiality violation. By observing how the physical elements react to cyber commands, adversaries can identify critical links in the system and force the cyber control algorithm to make erroneous decisions. Thus, there is a propensity for a breach in confidentiality leading to further attacks on availability or integrity. Due to the highly integrated nature of Cyber-Physical Systems, it is also extremely difficult to map the system semantics into a security framework under existing security models. The far-reaching objective of this research …