Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- San Jose State University (51)
- Regis University (33)
- Brigham Young University (26)
- Missouri University of Science and Technology (22)
- Dartmouth College (20)
-
- University of Massachusetts Amherst (20)
- University of South Florida (20)
- Utah State University (19)
- University of Nevada, Las Vegas (18)
- Old Dominion University (17)
- University of Texas at Arlington (17)
- Air Force Institute of Technology (16)
- Louisiana State University (14)
- University of Texas at El Paso (14)
- Walden University (14)
- Western University (14)
- Clemson University (13)
- New Jersey Institute of Technology (12)
- Wayne State University (12)
- California Polytechnic State University, San Luis Obispo (11)
- Nova Southeastern University (11)
- California State University, San Bernardino (10)
- University of Tennessee, Knoxville (10)
- Wright State University (10)
- University of Arkansas, Fayetteville (9)
- University of Central Florida (9)
- University of Kentucky (9)
- Edith Cowan University (8)
- University of Nebraska at Omaha (8)
- The University of Southern Mississippi (6)
- Keyword
-
- College for Professional Studies (33)
- School of Computer & Information Science (32)
- Applied sciences (16)
- Machine learning (10)
- Management (10)
-
- MS Information Technology Management (9)
- Regis University MSCIS thesis (8)
- Department of Computer Science (7)
- MS Computer and Information Technology (7)
- School of Computer & Information Sciences Theses (7)
- 2011 (6)
- Information technology (6)
- MSCIS thesis (6)
- Security (6)
- Software engineering (6)
- Algorithms (5)
- Business administration (5)
- Computer simulation (5)
- Data mining (5)
- MS Systems Engineering (5)
- Network (5)
- Visualization (5)
- #antcenter (4)
- Animation (4)
- Clustering (4)
- Computer vision (4)
- Gender (4)
- MS Information Assurance (4)
- MS Software Engineering and Database Technologies (4)
- Optimization (4)
- Publication
-
- Master's Projects (51)
- Theses and Dissertations (51)
- Regis University Student Publications (comprehensive collection) (33)
- Masters Theses (22)
- USF Tampa Graduate Theses and Dissertations (20)
-
- Open Access Dissertations (19)
- Electronic Theses and Dissertations (18)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (18)
- Doctoral Dissertations (14)
- Electronic Thesis and Dissertation Repository (14)
- Open Access Theses & Dissertations (14)
- Walden Dissertations and Doctoral Studies (14)
- Dissertations (13)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (11)
- CCE Theses and Dissertations (11)
- Dartmouth College Undergraduate Theses (11)
- Browse all Theses and Dissertations (10)
- Computer Science and Engineering Dissertations (10)
- Master's Theses (10)
- Theses Digitization Project (10)
- Wayne State University Dissertations (10)
- All Theses (9)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (8)
- Student Work (8)
- Computer Science and Computer Engineering Undergraduate Honors Theses (7)
- Computer Science and Engineering Theses (7)
- Honors Theses (7)
- LSU Doctoral Dissertations (7)
- Theses (7)
- Computational Modeling & Simulation Engineering Theses & Dissertations (6)
- File Type
Articles 31 - 60 of 564
Full-Text Articles in Physical Sciences and Mathematics
Making An Impact On The Obesity Epidemic By Deploying A Mobile Fitness Suite On The Android Market, Chad Richards
Making An Impact On The Obesity Epidemic By Deploying A Mobile Fitness Suite On The Android Market, Chad Richards
Computer Science and Computer Engineering Undergraduate Honors Theses
The Mobile Fitness Suite aims to make an impact on the obesity epidemic by deploying a set of mobile fitness applications on the Android Market. The thesis details the health and financial issues with the obesity epidemic, along with its causes, and how a set of fitness applications can aid with the obesity epidemic. It also explains the reasons for releasing the program on the Android Market and details each step in the process of deploying a mobile application to the Android Market. Further, it discusses the design and architecture that went into the development of the Mobile Fitness Suite …
High Performance Geospatial Analysis On Emerging Parallel Architectures, Seth Warn
High Performance Geospatial Analysis On Emerging Parallel Architectures, Seth Warn
Graduate Theses and Dissertations
Geographic information systems (GIS) are performing increasingly sophisticated analyses on growing data sets. These analyses demand high performance. At the same time, modern computing platforms increasingly derive their performance from several forms of parallelism. This dissertation explores the available parallelism in several GIS-applied algorithms: viewshed calculation, image feature transform, and feature analysis. It presents implementations of these algorithms that exploit parallel processing to reduce execution time, and analyzes the effectiveness of the implementations in their use of parallel processing.
The Design & Implementation Of An Abstract Semantic Graph For Statement-Level Dynamic Analysis Of C++ Applications, Edward Duffy
The Design & Implementation Of An Abstract Semantic Graph For Statement-Level Dynamic Analysis Of C++ Applications, Edward Duffy
All Dissertations
In this thesis, we describe our system, Hylian, for statement-level analysis,
both static and dynamic, of a C++ application. We begin by extending the
GNU gcc parser to generate parse trees in XML format for each of the
compilation units in a C++ application. We then provide verification that the
generated parse trees are structurally equivalent to the code in the
original C++
application. We use the generated parse trees, together with an augmented
version of the gcc test suite, to recover a grammar for the C++ dialect that
we parse. We use the recovered grammar to generate a schema …
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell
UNLV Theses, Dissertations, Professional Papers, and Capstones
The Monte Carlo method provides powerful geometric modeling capabilities for large problem domains in 3-D; therefore, the Monte Carlo method is becoming popular for 3-D fuel depletion analyses to compute quantities of interest in spent nuclear fuel including isotopic compositions. The Monte Carlo approach has not been fully embraced due to unresolved issues concerning the effect of Monte Carlo uncertainties on the predicted results.
Use of the Monte Carlo method to solve the neutron transport equation introduces stochastic uncertainty in the computed fluxes. These fluxes are used to collapse cross sections, estimate power distributions, and deplete the fuel within depletion …
Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee
Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee
UNLV Theses, Dissertations, Professional Papers, and Capstones
This research identifies factors that impact software maintenance effort by exploring the decision-making process of expert estimators of corrective maintenance projects by using qualitative methods to identify the factors that they use in deriving estimates. We implement a technique called causal mapping, which allows us to identify the cognitive links between the information that estimators use, and the estimates that they produce based on that information. Results suggest that a total of 17 factors may be relevant for corrective maintenance effort estimation, covering constructs related to developers, code, defects, and environment. When these factors are rank-ordered, they demonstrate that some …
Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave
Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave
UNLV Theses, Dissertations, Professional Papers, and Capstones
This thesis will discuss feature selection algorithms for text-categorization. Feature selection algorithms are very important, as they can make-or-break a categorization engine. The feature selection algorithms that will be discussed in this thesis are Document Frequency, Information Gain, Chi Squared, Mutual Information, NGL (Ng-Goh-Low) coefficient, and GSS (Galavotti-Sebastiani-Simi) coefficient . The general idea of any feature selection algorithm is to determine importance of words using some measure that can keep informative words, and remove non-informative words, which can then help the text-categorization engine categorize a document, D , into some category, C . These feature selection methods are explained, implemented, …
Development Of A Simulation Tool For Analysis Of Freeway Crashes Due To Cell Phone Usage, Sourabh Sriom
Development Of A Simulation Tool For Analysis Of Freeway Crashes Due To Cell Phone Usage, Sourabh Sriom
UNLV Theses, Dissertations, Professional Papers, and Capstones
Research shows that drivers are susceptible to numerous distractions while driving which can be held responsible as the reason of a crash. Usage of cell phones, i.e. talking or texting while driving is considered one of the prominent distractions which causes a crash. This dissertation aims to study the number of crashes occurring on the freeways and their relation with the drivers of these cars using cell phones while they are driving. Since crashes occur relatively less frequently, the study of crashes is done using what is called the "rare event" theory. Java based simulations are done to model a …
The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh
The Valuation Of User-Generated Content: A Structural, Stylistic And Semantic Analysis Of Online Reviews, Noi Sian Koh
Dissertations and Theses Collection (Open Access)
The ability and ease for users to create and publish content has provided vast amount of online product reviews. However, the amount of data is overwhelmingly large and unstructured, making information difficult to quantify. This creates challenge in understanding how online reviews affect consumers’ purchase decisions. In my dissertation, I explore the structural, stylistic and semantic content of online reviews. Firstly, I present a measurement that quantifies sentiments with respect to a multi-point scale and conduct a systematic study on the impact of online reviews on product sales. Using the sentiment metrics generated, I estimate the weight that customers place …
Automating Construction And Selection Of A Neural Network Using Stochastic Optimization, Jason Lee Hurt
Automating Construction And Selection Of A Neural Network Using Stochastic Optimization, Jason Lee Hurt
UNLV Theses, Dissertations, Professional Papers, and Capstones
An artificial neural network can be used to solve various statistical problems by approximating a function that provides a mapping from input to output data. No universal method exists for architecting an optimal neural network. Training one with a low error rate is often a manual process requiring the programmer to have specialized knowledge of the domain for the problem at hand.
A distributed architecture is proposed and implemented for generating a neural network capable of solving a particular problem without specialized knowledge of the problem domain. The only knowledge the application needs is a training set that the network …
Consolidated Study On Query Expansion, Abhishek Biruduraju
Consolidated Study On Query Expansion, Abhishek Biruduraju
UNLV Theses, Dissertations, Professional Papers, and Capstones
A typical day of million web users all over the world starts with a simple query. The quest for information on a particular topic drives them to search for it, and in the pursuit of their info the terms they supply for queries varies from person to person depending on the knowledge they have. With a vast collection of documents available on the web universe it is the onus of the retrieval system to return only those documents that are relevant and satisfy the user’s search requirements. The document mismatch problem is resolved by appending extra query terms to the …
Parallel Machines Scheduling With Applications To Internet Ad-Slot Placement, Shaista Lubna
Parallel Machines Scheduling With Applications To Internet Ad-Slot Placement, Shaista Lubna
UNLV Theses, Dissertations, Professional Papers, and Capstones
We consider a class of problems of scheduling independent jobs on identical, uniform and unrelated parallel machines with an objective of achieving an optimal schedule. The primary focus is on the minimization of the maximum completion time of the jobs, commonly referred to as Makespan (C max ). We survey and present examples of uniform machines and its applications to the single slot and multiple slots based on bids and budgets.
The Internet is an important advertising medium attracting large number of advertisers and users. When a user searches for a query, a search engine returns a set of results …
Precisely Serializable Snapshot Isolation, Stephen Anthony Revilak
Precisely Serializable Snapshot Isolation, Stephen Anthony Revilak
Graduate Doctoral Dissertations
Snapshot Isolation (SI) is a method of database concurrency control that uses timestamps and multiversioning, in preference to pessimistic locking. Since its introduction in 1995, SI has become a popular isolation level, and has been implemented in a variety of database systems: Oracle, Postgres, Microsoft SQL Server, and others. Despite the benefits that SI offers, one of the things it cannot provide is serializability. Past approaches for serializable SI have focused on avoiding dangerous structures (or essential dangerous structures). Dangerous structures are patterns of transaction dependencies that indicate the potential for a non-serializable execution; however, the presence of dangerous structures …
A Dynamic State Metabolic Journey: From Mass Spectrometry To Network Analysis Via Estimation Of Kinetic Parameters, Arockia Ranjitha Dhanasekaran
A Dynamic State Metabolic Journey: From Mass Spectrometry To Network Analysis Via Estimation Of Kinetic Parameters, Arockia Ranjitha Dhanasekaran
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
The term "metabolism" refers to the chemical processes occurring in a living organism to convert the food consumed into the energy needed to maintain a living state. Metabolism consists of two states, namely, a dynamic state and a steady state. In the dynamic state, the rate of chemical conversion of a substance is proportional to the amount of substance available, whereas in the steady state this rate is constant and independent of the amount of substance present (Chapter 4 Figure 1). Like all other fields of engineering, metabolic engineering involves the analysis and synthesis of metabolism. Molecular biological tools for …
Fast Spheroidal Weathering With Colluvium Deposition, Mckay T. Farley
Fast Spheroidal Weathering With Colluvium Deposition, Mckay T. Farley
Theses and Dissertations
It can be difficult to quickly and easily create realistic sandstone terrain. Film makers often need to generate realistic terrain for establishing the setting of their film. Many methods have been created which address terrain generation. One such method is using heightmaps which encode height as a gray-value in a 2d image. Most terrain generation techniques don't admit concavities such as overhangs and arches. We present an algorithm that operates on a voxel grid for creating 3d terrain. Our algorithm uses curvature estimation to weather away the terrain. We speed up our method using a caching mechanism that stores the …
An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski
An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski
Regis University Student Publications (comprehensive collection)
Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID"â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication …
Fast Parallel Machine Learning Algorithms For Large Datasets Using Graphic Processing Unit, Qi Li
Fast Parallel Machine Learning Algorithms For Large Datasets Using Graphic Processing Unit, Qi Li
Theses and Dissertations
This dissertation deals with developing parallel processing algorithms for Graphic Processing Unit (GPU) in order to solve machine learning problems for large datasets. In particular, it contributes to the development of fast GPU based algorithms for calculating distance (i.e. similarity, affinity, closeness) matrix. It also presents the algorithm and implementation of a fast parallel Support Vector Machine (SVM) using GPU. These application tools are developed using Compute Unified Device Architecture (CUDA), which is a popular software framework for General Purpose Computing using GPU (GPGPU). Distance calculation is the core part of all machine learning algorithms because the closer the query …
Carry And Expand: A New Nomadic Interaction Paradigm, Richard B. Arthur
Carry And Expand: A New Nomadic Interaction Paradigm, Richard B. Arthur
Theses and Dissertations
People are nomadic; traveling from place to place. As a user travels, he may need access to his digital information, including his data, applications, and settings. A convenient way to supply this access is to have the user carry that digital information in a portable computer such as a laptop or smart phone. As Moore's Law continues to operate, devices such as smart phones can easily perform the computing necessary for a user's work. Unfortunately, the amount of data a human can receive and convey through such devices is limited. To receive more information humans require more screen real estate. …
A Foveated System For Wilderness Search And Rescue In Manned Aircraft, Carson D. Fenimore
A Foveated System For Wilderness Search And Rescue In Manned Aircraft, Carson D. Fenimore
Theses and Dissertations
Wilderness search and rescue can be assisted by video searchers in manned aircraft. The video searcher's primary task is to find clues on the ground. Due to altitude, it may be difficult to resolve details on the ground with a standard video camera. As the video streams at a constant frame rate, the searcher may become distracted by other tasks. While handling these tasks the searcher may miss important clues or spend extra time flying over the search area; either outcome decreases both the effectiveness of the video searcher and the chances of successfully finding missing persons. We develop an …
Trust-Based Service Selection, Zainab Aljazzaf
Trust-Based Service Selection, Zainab Aljazzaf
Electronic Thesis and Dissertation Repository
Service Oriented Architecture (SOA) is an architectural style that builds enterprise solutions based on services. In SOA, the lack of trust between different parties affects the adoption of such architecture. Trust is as significant a factor for successful online interactions as it is in real life communities, and consequently, it is an important factor that is used as a criterion for service selection. In the context of online services and SOA, the literature shows that the field of trust is not mature. Trust definition and the consideration of the essentials of trust aspects do not reflect the true nature of …
Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal
Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal
Regis University Student Publications (comprehensive collection)
Data Warehouse applications are designed basically to provide the business communities with accurate and consolidated information. The objective of Data Warehousing applications are not just for collecting data and reporting, but rather for analyzing, it requires technical and business expertise tools. To achieve business intelligence it requires proper tools to be selected. The most commonly used Business intelligence (BI) technologies are Online Analytical Processing (OLAP) and Reporting tools for analyzing the data and to make tactical decision for the better performance of the organization, and more over to provide quick and fast access to end user request. This study will …
Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang
Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang
Theses and Dissertations
Internet rate control protocols, such as TCP, encounter severe performance problems in wireless mesh networks. Because wireless networks use shared communication channels, contention and interference can significantly degrade flow throughput and fairness. Existing research takes either an engineering-based or optimization-based approach to solve the performance problems. The engineering-based approach usually solves a specific observed problem, but does not necessarily optimize the overall performance. The optimization-based approach mathematically models the network to find the optimal resource allocation among competing flows. The model can lead to a distributed rate control algorithm with performance guarantees, but relatively little work has been done to …
A Representation Of Selected Nonmanual Signals In American Sign Language, Jerry C. Schnepp
A Representation Of Selected Nonmanual Signals In American Sign Language, Jerry C. Schnepp
College of Computing and Digital Media Dissertations
Computer-generated three-dimensional animation holds great promise for synthesizing utterances in American Sign Language (ASL) that are not only grammatical, but believable by members of the Deaf community. Animation poses several challenges stemming from the massive amounts of data necessary to specify the movement of three-dimensional geometry, and there is no current system that facilitates the synthesis of nonmanual signals. However, the linguistics of ASL can aid in surmounting the challenge by providing structure and rules for organizing the data.
This work presents a first method for representing ASL linguistic and extralinguistic processes that involve the face. Any such representation must …
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong
USF Tampa Graduate Theses and Dissertations
Despite our awareness of the fascination modern humans have with the Internet, little is known about how and why colleges and universities create and maintain Websites. At the most general level, in this case study, I hypothesize that university Websites serve as communication and marketing tools in attracting students. At the most specific level, I postulate that civil engineering programs with Web pages depicting images of women and minorities would be more successful in recruiting and retaining women and students of color than civil engineering programs with Web pages displaying fewer or no images of women and minorities. The primary …
The Good, The Bad, And The Actively Verified, John Williamson
The Good, The Bad, And The Actively Verified, John Williamson
Dartmouth College Master’s Theses
We believe that we can use active probing for compromise recovery. Our intent is to exploit the differences in behavior between compromised and uncompromised systems and use that information to identify those which are not behaving as expected. Those differences may indicate a deviation in either con figuration or implementation from what we expect on the network, either of which suggests that the misbehaving entity might not be trustworthy. In this work, we propose and build a case for a method for using altered behavior directly resulting from or introduced as a side-effect of the compromise of a network service …
Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza
Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza
Regis University Student Publications (comprehensive collection)
Shotgun proteomics refers to the direct analysis of complex protein mixtures to create a profile of the proteins present in the cell. These profiles can be used to study the underlying biological basis for cancer development. Closely studying the profiles as the cancer proliferates reveals the molecular interactions in the cell. They provide clues to researchers on potential drug targets to treat the disease. A little more than a decade old, shotgun proteomics is a relatively new form of discovery, one that is data intensive and requires complex data analysis. Early studies indicated a gap between the ability to analyze …
Classic Mosaics And Visual Correspondence Via Graph-Cut Based Energy Optimization, Yu Liu
Classic Mosaics And Visual Correspondence Via Graph-Cut Based Energy Optimization, Yu Liu
Electronic Thesis and Dissertation Repository
Computer graphics and computer vision were traditionally two distinct research fields focusing on opposite topics. Lately, they have been increasingly borrowing ideas and tools from each other. In this thesis, we investigate two problems in computer vision and graphics that rely on the same tool, namely energy optimization with graph cuts.
In the area of computer graphics, we address the problem of generating artificial classic mosaics, still and animated. The main purpose of artificial mosaics is to help a user to create digital art. First we reformulate our previous static mosaic work in a more principled global optimization framework. Then, …
Three-Dimensional Modeling Of Electrostatic Precipitator Using Hybrid Finite Element - Flux Corrected Transport Technique, Niloofar Farnoosh
Three-Dimensional Modeling Of Electrostatic Precipitator Using Hybrid Finite Element - Flux Corrected Transport Technique, Niloofar Farnoosh
Electronic Thesis and Dissertation Repository
This thesis presents the results of a three-dimensional simulation of the entire precipitation process inside a single-electrode one-stage electrostatic precipitator (ESP). The model was designed to predict the motion of ions, gas and solid particles. The precipitator consists of two parallel grounded collecting plates with a corona electrode mounted at the center, parallel to the plates and excited with a high dc voltage. The complex mutual interaction between the three coexisting phenomena of electrostatic field, fluid dynamics and the particulate transport, which affect the ESP process, were taken into account in all the simulations. The electrostatic field and ionic space …
Improving Multi-Label Classification By Avoiding Implicit Negativity With Incomplete Data, Derrall L. Heath
Improving Multi-Label Classification By Avoiding Implicit Negativity With Incomplete Data, Derrall L. Heath
Theses and Dissertations
Many real world problems require multi-label classification, in which each training instance is associated with a set of labels. There are many existing learning algorithms for multi-label classification; however, these algorithms assume implicit negativity, where missing labels in the training data are automatically assumed to be negative. Additionally, many of the existing algorithms do not handle incremental learning in which new labels could be encountered later in the learning process. A novel multi-label adaptation of the backpropagation algorithm is proposed that does not assume implicit negativity. In addition, this algorithm can, using a naive Bayesian approach, infer missing labels in …
Continuous Monitoring In The Cloud Environment, Victoria Nyffeler
Continuous Monitoring In The Cloud Environment, Victoria Nyffeler
Regis University Student Publications (comprehensive collection)
The National Institute of Standards and Technology introduced a risk management framework that concludes with a process for continuous monitoring. Continuous monitoring is a way to gain near real-time insight into the security health of an information technology environment. The cloud environment is unique from other environments in the way that resources are virtualized and shared among many cloud tenants. This type of computing has been gaining popularity as a solution for organizations to purchase resources as an on-demand service in the same way that an organization purchases utilities today. In order to experience the benefits promised by the emergence …
An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy
An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy
Regis University Student Publications (comprehensive collection)
The emergency 9-1-1 service is a vital part of our nation"â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and …