Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Brigham Young University (31)
- Regis University (30)
- New Jersey Institute of Technology (29)
- California State University, San Bernardino (27)
- Air Force Institute of Technology (24)
-
- Louisiana State University (18)
- University of Central Florida (18)
- Dartmouth College (10)
- Edith Cowan University (8)
- Munster Technological University (8)
- Old Dominion University (8)
- Nova Southeastern University (7)
- Trinity University (7)
- University of Tennessee, Knoxville (6)
- University of Texas Rio Grande Valley (6)
- William & Mary (6)
- American University in Cairo (5)
- Louisiana Tech University (5)
- Virginia Commonwealth University (5)
- Florida Institute of Technology (4)
- Georgia State University (4)
- East Tennessee State University (3)
- The University of Maine (3)
- University of North Florida (3)
- Southern University and A&M College (2)
- University of Richmond (2)
- Western Michigan University (2)
- Wright State University (2)
- Colby College (1)
- Missouri University of Science and Technology (1)
- Keyword
-
- College for Professional Studies (30)
- MS Computer and Information Technology (29)
- School of Computer & Information Science (25)
- Regis University MSCIT thesis (21)
- Computer science (8)
-
- Applied sciences (6)
- Computer (5)
- Computer security (5)
- School of Computer and Information Sciences (5)
- Security (5)
- Computer networks--Security measures (4)
- Electronic commerce (4)
- Sensor networks (4)
- Approximation algorithms (3)
- Database (3)
- Database management (3)
- Electronic funds transfers (3)
- Genetic algorithms (3)
- Human-computer interaction (3)
- Information retrieval (3)
- Information storage and retrieval systems (3)
- Information systems (3)
- Machine learning (3)
- Network security (3)
- Regis University MSCIT Thesis (3)
- Routing (3)
- Scheduling (3)
- Simulation (3)
- Trust negotiation (3)
- UNF; University of North Florida; Department of Computer and Information Sciences; Dissertations (3)
- Publication
-
- Theses and Dissertations (64)
- Regis University Student Publications (comprehensive collection) (30)
- Theses Digitization Project (27)
- Electronic Theses and Dissertations (24)
- Dissertations (19)
-
- Theses (19)
- LSU Doctoral Dissertations (9)
- Computer Science Theses & Dissertations (8)
- LSU Master's Theses (8)
- CCE Theses and Dissertations (7)
- Computer Science Honors Theses (7)
- Masters Theses (7)
- Theses : Honours (7)
- Dissertations, Theses, and Masters Projects (6)
- Doctoral Dissertations (6)
- Theses and Dissertations - UTB/UTPA (6)
- Archived Theses and Dissertations (5)
- Dartmouth College Ph.D Dissertations (5)
- Honors Theses (4)
- Computer Science Theses (3)
- Dartmouth College Undergraduate Theses (3)
- UNF Graduate Theses and Dissertations (3)
- Browse all Theses and Dissertations (2)
- Dartmouth College Master’s Theses (2)
- Electronic Dissertations and Theses (2)
- Computer Science Dissertations (1)
- Theses, Dissertations and Culminating Projects (1)
- Theses: Doctorates and Masters (1)
Articles 1 - 30 of 286
Full-Text Articles in Physical Sciences and Mathematics
Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall
Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall
Theses and Dissertations
Many environments in which an agent can use reinforcement learning techniques to learn profitable strategies are affected by other learning agents. These situations can be modeled as general-sum games. When playing repeated general-sum games with other learning agents, the goal of a self-interested learning agent is to maximize its own payoffs over time. Traditional reinforcement learning algorithms learn myopic strategies in these games. As a result, they learn strategies that produce undesirable results in many games. In this dissertation, we develop and analyze algorithms that learn non-myopic strategies when playing many important infinitely repeated general-sum games. We show that, in …
Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry
Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry
Electronic Theses and Dissertations
Users of high availability (HA) computing require systems that run continuously, with little or no downtime. Modern PCs address HA needs by monitoring operating system parameters such as voltage, temperature, and hard drive status in order to anticipate possible system failure. However, one modality for PC monitoring that has been underutilized is sound. The application described here uses wavelet theory to analyze sounds produced by PC hard drives during standard operation. When twenty-nine hard drives were tested with the application and the results compared with the drives' Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) data, the binomial distribution's low p-value of …
Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder
Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder
Theses and Dissertations
Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …
Conference Web Site Redesign, Steven M. Pisarski
Conference Web Site Redesign, Steven M. Pisarski
Regis University Student Publications (comprehensive collection)
Sustainable Resources was a non-profit organization based out of Boulder, CO that, at the time of this project hosted yearly conferences to help find solutions to world poverty. Although, the previous web site had a professional appearance, it was not meeting their needs with regards to usability, extensibility, and maintainability, as they had been forced to rely heavily on a transient volunteer IT labor base. The aim of this project was to address their functional and maintenance problems. The application's front-end was built in adherence to the Model -view-Controller (MVC) design pattern and implemented using the Jakarta Struts framework and …
Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson
Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson
Theses and Dissertations
The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that …
Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae
Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae
Theses and Dissertations
Today, it is becoming increasingly clear that there is a growing interest, concern, and need for technological literacy. To this end, the International Technology Education Association (ITEA) through the Technology for All Americans Project, has developed and promulgated the Standards for Technological Literacy: Content for the Study of Technology. This effort is part of the ongoing initiative to develop technology standards on a national level, and to focus on what every student in grades K-12 should know and be able to do in order to achieve technological literacy (ITEA, 2000). The purpose of this study was to investigate the perceived …
The Cherry Creek Sneak A Database Solution, Analissa Hilt
The Cherry Creek Sneak A Database Solution, Analissa Hilt
Regis University Student Publications (comprehensive collection)
The purpose of the database was to provide a repository of information about the race, the racers, the sponsors and other miscellaneous information that may in the future prove to provide a better understanding of the customers of The Sneak. This project was completed with the long-term goals that the information contained in the database will be utilized to reduce registration time, recruit prior year participants to participate in future events and provide a tool to intimately understand the customers of the race.
High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai
High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai
Doctoral Dissertations
In the first-principles calculation of electronic structures, one of the most timeconsuming tasks is that of computing the eigensystem of a large symmetric nonlinear eigenvalue problem. The standard approach is to use an iterative scheme involving the solution to a large symmetric linear eigenvalue problem in each iteration. In the early and intermediate iterations, significant gains in efficiency may result from solving the eigensystem to reduced accuracy. As the iteration nears convergence, the eigensystem can be computed to the required accuracy.
Traditional real symmetric eigensolvers compute the eigensystem in three steps: 1) reduce a dense matrix to a symmetric tridiagonal …
A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang
A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang
Dartmouth College Master’s Theses
To make ad hoc wireless networks adaptive to different mobility and traffic patterns, we studied in this thesis an approach to swap from one protocol to another protocol dynamically, while routing continues. By the insertion of a new layer, we were able to make each node in the ad hoc wireless network notify each other about the protocol swap. To ensure that routing works efficiently after the protocol swap, we initialized the destination routing protocol's data structures and reused the previous routing information to build the new routing table. We also tested our approach under different network topologies and traffic …
Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill
Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill
Regis University Student Publications (comprehensive collection)
The Internet and electronic commerce have opened up new opportunities for efficiency in research administration. Public Law 106-107 or the Federal Financial Assistance Improvement Act signed on November 20, 1999 and the President's Management Agenda have formally charged federal grant-making agencies with creating a single electronic system to find and apply for federal grant opportunities. In response to this directive, recipient organizations will need the ability to electronically prepare and submit proposal information and receive funding data from the sponsoring agency. This project reviews the implementation of a software package, MIT's Coeus Grant Management System, as a solution to the …
Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele
Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele
Regis University Student Publications (comprehensive collection)
The North Texas PC Users Group is a non-profit that is struggling with their existing membership process. This thesis explores the analysis of a new membership process and discusses the resulting new architecture and system design to implement it. The implementation of this new business process will reduce the time to produce the standard monthly reports and foster future membership retention efforts. The new design supports Ecommerce instant transactions, online availability of reports for the Board of Directors, and the access control of a member-only online site. The research for this project included an analysis of the cost, benefits, and …
Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan
Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan
Computer Science Theses & Dissertations
Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …
Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham
Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham
Masters Theses
This document describes an attempt at acheiving high precision matrix multiplication results from the Lenslet EnLight256 Optical Signal Processor (OSP), which on its own can only produce results which are hardware limited to 8-bit signed integers. Due to it’s low precision, it’s has only limited applicability to real world problems, and if higher precision results were possible from the machine it could be used for more applications. A C library is developed for this thesis to allow high-precision results from the EnLight256. The library is described and results are given. Finally an implementation of the Jacobi Method on the EnLight256 …
Online Support For Multivariate Integration, Shujun Li
Online Support For Multivariate Integration, Shujun Li
Dissertations
In this dissertation, we present an online problem solving environment for multivariate numerical integration. To build an environment for users with various backgrounds, we address issues of Web interface support for end-users, remote application programming interfaces for distributed system programmers, visualization of multivariate integrand functions for problem analysis, and highly efficient integration methods. Compared to previous implementations, our new load balancing schemes increase the scalability of parallel integration and hence are suitable for large scale computations. A parallel integration service, called PI service, was implemented based on Web services technologies to support both remote integration and remote visualization. The multivariate …
Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass
Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass
Regis University Student Publications (comprehensive collection)
The Cherry Creek Sneak is the 3rd largest 5-mile race in the United States.Currently, 10% of the proceeds from the race are donated to the ColoradoGovernor's Council to fight childhood obesity. The co-owners of the race, Pat Downing and Paula Tiernen, live in different states, and because of this, are unable to manage The Cherry Creak Sneak, or any business regarding the race efficiently. In order to continue the race in the future, they have requested that the Cherry Creek Sneak website be the place where their business is conducted. The goal of this project, therefore, is to create a …
Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi
Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi
Computer Science Theses & Dissertations
Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …
Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant
Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant
Theses and Dissertations
Sequence comparison is one of the most primitive operations used in bio-informatics. It is used as a basis for many other complex manipulations in the field of Computational Molecular Biology. Many methods and algorithms were developed to compare and align sequences effectively. Most of these methods use linear comparison and some standard scoring schemes to calculate the similarity between sequences. We described an alternative approach to compare sequences based on the correlogram method. This method has already been used in the past for comparing images. By using the correlogram method, a sequence is projected on a 3-D space and the …
An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier
An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier
Theses and Dissertations - UTB/UTPA
The algorithm most often used for the problem of interpolating sparse multivariate polynomials from their values is Zippel's probabilistic algorithm (1988). The algorithm evaluates the function to be interpolated at a significant number of points, and for many problems of interest processing evaluations dominates the running time. This thesis presents an improvement of Zippel's algorithm, which decreases the number of evaluations needed for an interpolation by using transposed Vandermonde systems for the univariate interpolation step of Zippel's algorithm. The technique also allows a more general form of the algorithm: it becomes possible to interpolate more than one variable within a …
Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan
Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan
Theses and Dissertations - UTB/UTPA
This thesis studies the properties of distance-based outliers and a better detection method for large multi-dimensional datasets. Outlier detection is an important task to find out the objects that deviate in a high ratio from the rest of the objects. The proposed algorithm breaks the data set into divisions and sets the area of access for each division, thus reducing the unnecessary access for a major set of elements. This algorithm reduces the run time of the existing algorithm by using separators. Datasets of varying sizes have been tested to analyze the empirical values of these procedures. Effective data structures …
Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou
Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou
Theses and Dissertations
Ontology-based data-extraction is a resilient web data-extraction approach. A major limitation of this approach is that ontology experts must manually develop and maintain data-extraction ontologies. The limitation prevents ordinary users who have little knowledge of conceptual models from making use of this resilient approach. In this thesis we have designed and implemented a general framework, OntoByE, to generate data-extraction ontologies semi-automatically through a small set of examples collected by users. With the assistance of a limited amount of prior knowledge, experimental evidence shows that OntoByE is capable of interacting with users to generate data-extraction ontologies for domains of interest to …
A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones
A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones
Theses and Dissertations
The purpose of this thesis was to utilize existing technologies to create a development environment suitable for creating context-aware applications and systems specific to home and family living conditions. After outlining the history of context-aware applications and the challenges that face family-centric systems in this field, a development environment was implemented that solves the unique challenges that face application development for family-centric, context-aware applications. In particular, research cited in this document indicates that a browser-based user interface is the most appropriate interface for a family environment. The flexibility of the interface, as well as the familiarity of the application structure …
Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker
Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker
Theses and Dissertations
Clinical trials are important to the advancement of medical science. They provide the experimental and statistical basis needed to determine the benefit of diagnostic and therapeutic agents and procedures. The more patients enrolled in a clinical trial, the more confidence we can have in the trial's results. However, current practices for identifying eligible patients can be expensive and time-consuming. To assist in making identification of eligible patients more cost effective, we have developed a system for translating the eligibility criteria for clinical trials to an executable form. This system takes as input the eligibility criteria for a trial formatted as …
Implementation Of Operational Framework In The Nlp (Based On Mof And Itil Standards), James Kapp
Implementation Of Operational Framework In The Nlp (Based On Mof And Itil Standards), James Kapp
Regis University Student Publications (comprehensive collection)
An operational framework, as proposed by the Microsoft Operational Framework (MOF) and the Information Technology Infrastructure Library (ITIL) provides a process model for controlling and managing Information Technology (IT) operations. With a strict focus on IT operations, it provides the processes and terminology to coordinate and integrate the functional elements of an IT department. The Systems Engineering and Applications Development (SEAD) practicum is composed of four main groups; Data Access, Network, Integrated Services and Development. This professional project will propose the beginning framework for overall operation and integration of the SEAD Practicum with an emphasis on service support and documentation. …
Verification Of Digital Controller Verifications, Xuan Wang
Verification Of Digital Controller Verifications, Xuan Wang
Theses and Dissertations
This thesis presents an analysis framework to verify the stablility property of a closed-loop control system with a software controller implementation. The usual approach to verifying stability for software uses experiments which are costly and can be dangerous. More recently, mathematical models of software have been proposed which can be used to reason about the correctness of controllers. However, these mathematical models ignore computational details that may be important in verification. We propose a method to determine the instability of a closed-loop system with a software controller implementation under l^2 inputs using simulation. This method avoids the cost of experimentation …
Real-Time Motion Transition By Example, Cameron Quinn Egbert
Real-Time Motion Transition By Example, Cameron Quinn Egbert
Theses and Dissertations
Motion transitioning is a common task in real-time applications such as games. While most character motions can be created a priori using motion capture or hand animation, transitions between these motions must be created by an animation system at runtime. Because of this requirement, it is often difficult to create a transition that preserves the feel that the actor or animator has put into the motion. An additional difficulty is that transitions must be created in real-time. This paper provides a method of creating motion transitions that is both computationally feasible for interactive speeds, and preserves the feel of the …
Course Development For A College Java Programming Class, Nathan Dodge
Course Development For A College Java Programming Class, Nathan Dodge
Regis University Student Publications (comprehensive collection)
This project documents the development of college-level curriculum for an Object Oriented Programming with Java course. The curriculum includes a set of lessons that students work through interactively. The lessons teach the fundamentals of object orientation. A goal of the project is to have students work with the same problem example throughout the entire set of lessons. Most texts on object orientation use several abstract examples which are used in a chapter or two of the text and are often not fully implemented. Each lesson of the project's curriculum presents an iteration of an evolving shape drawing application. Each lesson …
Development Of A Centralized Database System For Embracing Horses And The Urban Farm, April D. Hoskins
Development Of A Centralized Database System For Embracing Horses And The Urban Farm, April D. Hoskins
Regis University Student Publications (comprehensive collection)
Embracing Horses and The Urban Farm at Stapleton, is a nonprofit organization whose mission statement is to connect children from inner city neighborhoods to their natural environment, instilling a sense of respect, appreciation, and, ultimately responsibility for the plants and animals which share that space and a working knowledge of responsible stewardship of those plants and animals. To achieve this mission a paper based and generic database system have been utilized to record information pertaining to volunteers, financial donors, program offerings, and mailing distributions. These current systems no longer meet the needs of the organization, as the number of children …
Use Of Cross-Connect Clusters To Optimize Routing In Stm-64-Based Sdh Optical Network Systems, Bret William Durrett
Use Of Cross-Connect Clusters To Optimize Routing In Stm-64-Based Sdh Optical Network Systems, Bret William Durrett
Regis University Student Publications (comprehensive collection)
With the migration to Synchronous Digital Hierarchy, which uses the concept of logical rings, for backbone transmission systems, one of the major concerns that has been brought up repeatedly is a method in which to bring sub-rate circuits from one ring to another without having to decompose the entire backbone data stream to its individual circuits. This is critically important since the backbone data rate can be as high as 10 Gigabits per second or greater and may carry several thousand circuits, ranging in data rate from less than 2.4 Kilobits per second to 2.5 Gbps (STM-16). One potential means …
Implementing A Product Lifecycle Management Solution, Christopher M. Ray
Implementing A Product Lifecycle Management Solution, Christopher M. Ray
Regis University Student Publications (comprehensive collection)
Aviation Technology Group, Inc. (ATG) is currently preparing for a lengthy FAA certification process that will require detailed documentation and verification of the accuracy of all components that will belong to the aircraft being developed (the Javelin). This includes but is not limited to contracts, detailed design specifications, CAD files, test and verification results, revision tracking, and effectivity of all components used in each aircraft. The company has recently flown its first nonconforming prototype and will be building subsequent test articles, which will be used for the process of the Javelin. In order to organize all of this information and …
Gateway Battered Women's Services Website Development Project, Lena Alhusseini
Gateway Battered Women's Services Website Development Project, Lena Alhusseini
Regis University Student Publications (comprehensive collection)
The development of a website for a non-profit organization concerned with domestic violence is described, including the needs assessment, methodology, implementation, finalization, and evaluation. Gateway Battered Women's Services (GBWS), in Aurora, Colorado, provides shelter, advocacy, and counseling for women and children affected by domestic violence. Its goal is the elimination of personal and societal violence against all women and children through education, support services, and promoting social change within the community. GBWS needed a web presence, a database, and an online counseling service to distribute information on domestic violence to potential clients and volunteers and to solicit donations. A questionnaire …