Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner Apr 2019

Exploring Different Modalities For Learning Computer Programming, Maxwell Brickner

Maxwell Brickner

My poster for the 2019 Annual BGSU Undergraduate Symposium for Research and Scholarship.


Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal Jan 2018

Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal

George K. Thiruvathukal

No abstract provided.


Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal Oct 2017

Computer Science And Cultural History: A Dialogue, David B. Dennis, George K. Thiruvathukal

David B. Dennis

No abstract provided.


Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde Jun 2017

Image-Based Identification Of Cell Cultures By Machine Learning, Oluleye Hezekiah Babatunde

Oluleye Babatunde

Biomedical laboratories often use different cell types in the same assay or the same cell type in different
assays. One cell type can become contaminated by another, or cells can be mis-identified, giving poor
results. Addressing these issues by DNA analyses can be time-consuming, labor intensive or costly to
implement. Here we uniquely employ Legendre moments (LM), Zernike moments (ZM), circularity and
a genetic algorithm (GA) to advance a computer-based vision system, and we task it to identify four cell
types used in virology: HeLa, Vero, BHK and PC3. By employing a k-nearest neighbor (kNN), multilayer
perceptron (MLP), Convolutional Neural …


The Economics Of Open Source, Christopher H. Hoebeke Nov 2012

The Economics Of Open Source, Christopher H. Hoebeke

Christopher H Hoebeke

No abstract provided.


Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa Armstrong Feb 2012

Importance Of Verification And Validation Of Data Sources In Attaining Information Superiority, Gautham Kasinath, Leisa Armstrong

Leisa Armstrong

Information superiority has been defined as a state that is achieved when a competitive advantage is derived from the ability to exploit a superior information position. To achieve such a superior information position enterprises and nations, alike, must not only collect and record correct, accurate, timely and useful information but also ensure that information recorded is not lost to competitors due to lack of comprehensive security and leaks. Further, enterprises that aim to attain information superiority must also ensure mechanisms of validating and verifying information to reduce the chances of mis-information. Although, research has been carried out into ways to …


Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong Feb 2012

Securing J2me Mobile Application Api Using Xacml, Gautham Kasinath, Leisa Armstrong

Leisa Armstrong

Following Moore's law, the numbers of mobile phones and their capabifities have increased exponentially in recent years. The platform of choice for running applications on resource constrained devices such as mobile phones, today, is the Java 2 Micro Edition (J2ME) with Connected Limited Device Configuration (CLDC). This popularity exposes the security risks. These risks include the loss of data, money and privacy. Means of securing mobile phones and communication have been weI! researched and models have been proposed, based on their success on desktop computers. However, little has been done to explore and correct inherent flaws and possible vulnerabilities in …


Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong Feb 2012

Network Engineering For C-Commerce Innovation: The Role Of Trust, Mark Brogan, Leisa Armstrong

Leisa Armstrong

The idea that social networks play an important role in knowledge diffusion of innovation has a long pedigree in innovation theory. In his Diffusion of Innovation (DOI) theory, Rogers (1995) argued that in the information network of the organization, managerial champions and opinion leaders could affect both organizational acceptance and also the velocity of adoption of innovation. In Small to Medium Enterprise (SME) C-commerce innovation, the role of such social factors has been understood in terms of ‘embedded network structure’ (Braun, 2003) that impacts on clustering behavior. This article explores the use of quantitative Social Network Analysis (SNA) to model …


Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa Armstrong Feb 2012

Analysis Of Pki As A Means Of Securing Odf Documents, Gautham Kasinath, Leisa Armstrong

Leisa Armstrong

Public Key Infrastructure (PKI) has for the last two decades been a means of securing systems and communication. With the adoption of Open Document Format (ODF) as an ISO standard, the question remains if the unpopular, expensive, complex and unmaintainable PKI can prove to be a viable means of securing ODF documents. This paper analyses the drawbacks of PKI and evaluates the useji.tlness of PKl in provisioning robust, cheap and maintainable XML security to XML based ODF. This paper also evaluates the existing research on XML security, more specifically fine grained access control.


The Protection Of Rights Management Information: Modernization Or Cup Half Full?, Mark Perry Sep 2010

The Protection Of Rights Management Information: Modernization Or Cup Half Full?, Mark Perry

Mark Perry

Many papers in this collection discuss the history and development of Bill C-32, An Act to Amend the Copyright Act, introduced into the Canadian Parliament on 2 June 2010, so that analysis will not be duplicated here. Among the failures of copyright reform has been the lack of addressing the required “balancing” of proprietary rights on the one hand, with user rights and the public domain on the other. Rights Management Information (RMI) can aid in this balancing. The RMI of a work is simply data that provide iden- tification of rights related to that work, either directly or indirectly. …


Collapsible Graphs And Reductions Of Line Graphs, Zhi-Hong Chen, Peter C.B. Lam, Wai-Chee Shiu May 2010

Collapsible Graphs And Reductions Of Line Graphs, Zhi-Hong Chen, Peter C.B. Lam, Wai-Chee Shiu

Zhi-Hong Chen

A graph G is collapsible if for every even subset X ⊆ V ( G ) , G has a subgraph such that G − E ( Γ ) is connected and the set of odd-degree vertices of Γ is X . A graph obtained by contracting all the non-trivial collapsible subgraphs of G is called the reduction of G . In this paper, we characterize graphs of diameter two in terms of collapsible subgraphs and investigate the relationship between the line graph of the reduction and the reduction of the line graph. Our results extend former results in [H.-J. …


A Game Theoretic Approach For Deploying Intrusion Detection Agent, Cheng-Kuang Wu Jan 2010

A Game Theoretic Approach For Deploying Intrusion Detection Agent, Cheng-Kuang Wu

Cheng-Kuang Wu

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value to compute the Shapley value of intrusion detection agent under the various threat levels. Therefore, the fair agent allocation creates a minimum set of IDS deployment costs. Numerical examples show that the network administrator can quantitatively evaluate the security risk of …


A Game Theoretic Framework For Multi-Agent Deployment In Intrusion Detection Systems, Cheng-Kuang Wu Jan 2010

A Game Theoretic Framework For Multi-Agent Deployment In Intrusion Detection Systems, Cheng-Kuang Wu

Cheng-Kuang Wu

Due to cost considerations there must exist in intrusion detection system, a trade-off between the user’s ease of access and capability of detecting attacks. The proposed framework applies two game theoretic models for economic deployment of intrusion detection agent. The first scheme models and analyzes the interaction behaviors between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value to compute the Shapley value of intrusion detection agent while considering the various threat levels. Therefore, the efficient agent …


An Ontology For Autonomic License Management, Qian Zhao, Mark Perry Oct 2009

An Ontology For Autonomic License Management, Qian Zhao, Mark Perry

Mark Perry

The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …


A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry Oct 2009

A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry

Mark Perry

Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.


Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry Oct 2009

Policy Driven Licensing Model For Component Software, Zhao Qian, Zhou Yu, Mark Perry

Mark Perry

Today, it is almost inevitable that software is licensed, rather than sold outright. As a part of the licensing policy, some protection mechanisms, whether hardware, legal or code-based, are invariably built into the license. The application of such mechanisms has primarily been in the realm of off-the-shelf, packaged, consumer software. However, as component-based software gradually becomes mainstream in software development, new component-oriented licensing systems are required. This paper proposes an enterprise component licensing model for the management of software component licenses. The model provides a comprehensive license management framework allowing for extensibility and flexibility. Furthermore, we identify differences between stand-alone …


Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry Jan 2009

Sla Automated Negotiation Manager For Computing Services, Halina Kaminski, Mark Perry

Mark Perry

Success in today’s marketing arena can often depend on companies embracing effective new technologies and integrating them into their business model. In the computing service supply industry, Service Level Agreements (SLAs) are commonly prepared and signed agreements between the service provider and its customers. SLAs should match business needs of both sides of the agreement as closely as possible. This paper focuses on at the steps and activities that the service provider can take to facilitate agreement. It proposes an automated way for creating SLA’s from a set of Service Level Objectives (SLOs). The SLA should achieve business goals, including …


Policies, Rules And Their Engines: What Do They Mean For Slas?, Mark Perry, Michael Bauer Jan 2009

Policies, Rules And Their Engines: What Do They Mean For Slas?, Mark Perry, Michael Bauer

Mark Perry

In our model for autonomic management of service level agreements (SLA), the roles played by policy and rules must be clearly differentiated. Although policy is typically an ideal we wish to achieve through the implementation of rules, the use of the terms policy and rule are often treated similarly and that consequently policy-engine and rule-engine are often used synonymously. It is our position that in the management of SLAs these terms have specific meanings. The definitions and models embodied are illustrated.


Differentiating Web Service Offerings, Halina Kaminski, Khalid Sherdil, Hanan Lutfiyya, Nazim Madhavji, Mark Perry Jan 2009

Differentiating Web Service Offerings, Halina Kaminski, Khalid Sherdil, Hanan Lutfiyya, Nazim Madhavji, Mark Perry

Mark Perry

The advent of Service Oriented Architecture (SOA) paradigm and increasing use of Web Services (WS) implies that the future will see a large number of services transferred between providers and consumers, using many applications or agents working on behalf of humans. Discovering and using the services is the easy part. Negotiating and selecting the best services from amongst the plethora of similar ones, depending on their cost and quality, is the challenging issue. However, existing WS-I standards neither cater to provision of Service Level Agreements (SLAs), nor their exchange between parties. These standards are confined merely to WS description (WSDL). …


Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry Jan 2009

Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry

Mark Perry

Elections, referenda and polls are vital processes for the operation of a modern democracy. They form the mechanism for transferring power from citizens to their representatives. Although some commentators claim that the pencil-and-paper systems used in countries such as Canada and UK are still the best method of avoiding voterigging, recent election problems, and the need for faster, better, cheaper vote counting, have stimulated great interest in managing the election process through the use of electronic voting systems. While computer scientists, for the most part, have been warning of the possible perils of such action, vendors have forged ahead with …


Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry Jan 2009

Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry

Mark Perry

Open and fair elections are paramount to modern democracy. Although some people claim that the penciland- paper systems used in countries such as Canada and UK are still the best method of avoiding vote rigging, recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. It is a goal of this paper to describe a voting system that is secret and secure as well as verifiable and useable over an existing computer network. We have designed and implemented an electronic voting system – Verifiable E-Voting (VEV) – with an underlying protocol …


Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry Jan 2009

Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry

Mark Perry

No abstract provided.


A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu Jun 2008

A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu

Cheng-Kuang Wu

Efficient emergency management must determine how and when to alert and advise the critical and appropriate response units to the danger of terrorist attacks, particularly when available resources are limited. We propose a framework for homeland security advisory system that incorporates two game theory models designed to advise response units and raise the alarm. In the first scheme the interactive behaviors between the elements or participants of the multi-emergency response system and the zone response unit are modeled and analyzed as a non-cooperative game, after which the terrorist threat value is derived from the mixed strategy Nash equilibrium. In the …


Mysql & Php For Data Librarians Workshop, Christopher Hoebeke, Patrick Yott Feb 2002

Mysql & Php For Data Librarians Workshop, Christopher Hoebeke, Patrick Yott

Christopher H Hoebeke

No abstract provided.


Perl For Librarians (Workshop On The Practical Extraction And Reporting Language), Patrick Yott, Christopher Hoebeke Feb 2000

Perl For Librarians (Workshop On The Practical Extraction And Reporting Language), Patrick Yott, Christopher Hoebeke

Christopher H Hoebeke

No abstract provided.