Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31861 - 31890 of 55218

Full-Text Articles in Physical Sciences and Mathematics

Fuzziness And Bayesian Analysis In Engineering, Matthias Stein, Michael Beer, Vladik Kreinovich Dec 2013

Fuzziness And Bayesian Analysis In Engineering, Matthias Stein, Michael Beer, Vladik Kreinovich

Departmental Technical Reports (CS)

An engineering analysis requires a realistic quantification of all input information. The amount and quality of the available information dictates the uncertainty model and its associated quantification concept. For inconsistent information, a distinction between probabilistic and non-probabilistic characteristics is beneficial. In this distinction, uncertainty refers to probabilistic characteristics and non-probabilistic characteristics are summarized as imprecision. When uncertainty and imprecision occur simultaneously, the uncertainty model fuzzy randomness appears useful. In a Bayesian approach the fuzzy probabilistic model provides the opportunity to take account of imprecision in data and in prior expert knowledge. The Bayesian approach ex-tended to inconsistent information is demonstrated …


Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei Dec 2013

Broadcasting With Prediction And Selective Forwarding In Vehicular Networks, Jainjun Yang, Zongming Fei

Computer Science Faculty Publications

Broadcasting in vehicular networks has attracted great interest in research community and industry. Broadcasting on disseminating information to individual vehicle beyond the transmission range is based on inter-vehicle communication systems. It is crucial to broadcast messages to other vehicles as fast as possible because the messages in vehicle communication systems are often emergency messages such as accident warning or alarm. In many current approaches, the message initiator or sender selects the node among its neighbors that is farthest away from it in the broadcasting direction and then assigns the node to rebroadcast the message once the node gets out of …


Securing Information Technology In Healthcare, Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andrés Molina-Markham, Karen M. Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson Dec 2013

Securing Information Technology In Healthcare, Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andrés Molina-Markham, Karen M. Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson

Dartmouth Scholarship

Information technology (IT) has great potential to improve healthcare quality while also improving efficiency, and thus has been a major focus of recent healthcare reform efforts. However, developing, deploying and using IT that is both secure and genuinely effective in the complex clinical, organizational and economic environment of healthcare is a significant challenge. Further, it is imperative that we better understand the privacy concerns of patients and providers, as well as the ability of current technologies, policies, and laws to adequately protect privacy. The Securing Information Technology in Healthcare (SITH) workshops were created to provide a forum to discuss security …


Towards A System For Controlling Client-Server Traffic In Virtual Worlds Using Sdn, Jason Anderson, Jim Martin Dec 2013

Towards A System For Controlling Client-Server Traffic In Virtual Worlds Using Sdn, Jason Anderson, Jim Martin

Publications

Scaling virtual worlds in the age of cloud computing is complicated by the problem of efficiently directing client-server traffic in the face of agile and dynamic compute resources. In this proposed model, Software Defined Networking and compact encoding of avatar data in packet headers are combined to make a fast, scalable, high capacity proxy server that can hide the server infrastructure while fitting well with the IaaS paradigm of modern cloud providers.


Singapore Management University Wins Inaugural Teradata University Network Teaching Innovation Award, Singapore Management University Dec 2013

Singapore Management University Wins Inaugural Teradata University Network Teaching Innovation Award, Singapore Management University

SMU Press Releases

Teradata Corporation, a leading global provider of analytic data platforms, marketing applications and analytics related consulting services, announced today the winner of the 2013 Teradata University Network (TUN) Teaching Innovation Award. Associate Professor Michelle Cheong and Mr Murphy Choy from the School of Information Systems at Singapore Management University (SMU) received the Award for their teaching case on "Effective Use of Data & Decision Analytics to Improve Order Distribution in a Supply Chain".


Group Selection And Key Management Strategies For Ciphertext-Policy Attribute-Based Encryption, Russell F. Martin Dec 2013

Group Selection And Key Management Strategies For Ciphertext-Policy Attribute-Based Encryption, Russell F. Martin

Theses

Ciphertext-Policy Attribute-Based Encryption (CPABE) was introduced by Bethencourt, Sahai, and Waters, as an improvement of Identity Based Encryption, allowing fine grained control of access to encrypted files by restricting access to only users whose attributes match that of the monotonic access tree of the encrypted file. Through these modifications, encrypted files can be placed securely on an unsecure server, without fear of malicious users being able to access the files, while allowing each user to have a unique key, reducing the vulnerabilites associated with sharing a key between multiple users.

However, due to the fact that CPABE was designed for …


Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel Dec 2013

Client-Based Qos Monitoring And Evaluation Architecture For Network Infrastructure And Services, Ammar Mohammed Kamel

Dissertations

Providing an efficient Quality-of-Service (QoS) measurement model is a challenging problem in today’s mobile computing and telecommunications networks. Currently, most of QoS techniques utilize service measurements that are collected by the network elements (i.e., network-side monitoring) to evaluate the network performance. However, this process does not take into account the service performance from the clients' perspective and might contradict with the Service Level Agreement (SLA). In order to overcome the limitations of service-side QoS monitoring, a number of research studies have been conducted to present alternative architectures and algorithms for client-side QoS service assessment in computer networks. The client-side QoS …


Dynamic Queue Management For Hospital Emergency Room Services, Kar Way Tan Dec 2013

Dynamic Queue Management For Hospital Emergency Room Services, Kar Way Tan

Dissertations and Theses Collection (Open Access)

The emergency room (ER) – or emergency department (ED) – is often seen as a place with long waiting times and a lack of doctors to serve the patients. However, it is one of the most important departments in a hospital, and must efficiently serve patients with critical medical needs. In the existing literature, addressing the issue of long waiting times in an ED often takes the form of single-faceted queue-management strategies that are either from a demand perspective or from a supply perspective. From the demand perspective, there is work on queue design such as priority queues, or queue …


The Design Of An Output Data Collection Framework For Ns-3, Luiz Felipe Perrone, Thomas R. Henderson, Mitchell J. Watrous, Vinícius D. Felizardo Dec 2013

The Design Of An Output Data Collection Framework For Ns-3, Luiz Felipe Perrone, Thomas R. Henderson, Mitchell J. Watrous, Vinícius D. Felizardo

Faculty Journal Articles

An important design decision in the construction of a simulator is how to enable users to access the data generated in each run of a simulation experiment. As the simulator executes, the samples of performance metrics that are generated beg to be exposed either in their raw state or after having undergone mathematical processing. Also of concern is the particular format this data assumes when externalized to mass storage, since it determines the ease of processing by other applications or interpretation by the user. In this paper, we present a framework for the \ns network simulator for capturing data from …


Surface Shape Perception In Volumetric Stereo Displays, Meng Zhu Dec 2013

Surface Shape Perception In Volumetric Stereo Displays, Meng Zhu

All Dissertations

In complex volume visualization applications, understanding the displayed objects and their spatial relationships is challenging for several reasons. One of the most important obstacles is that these objects can be translucent and can overlap spatially, making it difficult to understand their spatial structures. However, in many applications, for example medical visualization, it is crucial to have an accurate understanding of the spatial relationships among objects. The addition of visual cues has the potential to help human perception in these visualization tasks. Descriptive line elements, in particular, have been found to be effective in conveying shape information in surface-based graphics as …


Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi Dec 2013

Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi

Graduate Theses and Dissertations

Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.

The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …


Skill Finder: Automated Job-Resume Matching System, Thimma Reddy Kalva Dec 2013

Skill Finder: Automated Job-Resume Matching System, Thimma Reddy Kalva

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

Skill Finder is a tool which ranks the student skills from the resumes to the job requirements from Employers, Department and Faculty looking for student interns, full-time employees and also Research, Graduate and Teaching Assistants. Skill Finder hosts student resumes, Academic history and contact information. Authorized users from the Department can post jobs, view job applicants and the Skill finder automatically sorts the students resumes based on the degree of match with the job. Skill finder also sends e-mail alerts to students about the jobs posted and keeps track of employer’s history by maintaining the complete history of jobs posted …


Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence Dec 2013

Forensic Investigation Of Mysql Database Management System, Andrew C. Lawrence

Computer Science and Computer Engineering Undergraduate Honors Theses

For various reasons, circumstances might arise in which an investigator, enlisting the help of a system administrator, needs access to an instance of MySQL that is password protected by an individual system user. If this password is unknown and the user is uncooperative or unavailable, alternative means must be utilized to gain access to the data stored within the program. Two main approaches will be explored, each with its pros and cons. In one case, the password can be bypassed entirely, granting the investigator unfettered access to the program data. The second method allows a narrower look at only some …


Room Generation, Removal, And Recovery In Udk 3.5, Scott Johnson Dec 2013

Room Generation, Removal, And Recovery In Udk 3.5, Scott Johnson

All Theses

This paper explores algorithms and techniques for creating an extended game world that represents a radical departure from the widely used static content in current use with most games featuring procedurally generated game worlds. Using the Unreal Development Kit 3.5 game engine and focusing on a small set of rooms and doors the research sets to create a game world that is in constant flux and addresses issues of game development limitations on the size of game worlds.


Detection Of Design Flaws In Object Oriented Software Systems, Sneha Lalit Dec 2013

Detection Of Design Flaws In Object Oriented Software Systems, Sneha Lalit

Culminating Projects in Computer Science and Information Technology

As the object oriented systems evolve, the original design is distorted and bad smells or deviation from good design heuristics are observed in the source code. Presence of design flaws in the software distorts the original design pattern realization and affects maintainability and flexibility of the code. In this paper, we study software evolution, design flaw detection and correction strategies. We focus on two design flaws and demonstrate their detection and correction. To detect design flaws we refer multiple strategies, define our own strategies and apply those to sample java software. A set of metric values are measured for the …


Contextual Analysis Of Large-Scale Biomedical Associations For The Elucidation And Prioritization Of Genes And Their Roles In Complex Disease, Jeremy J. Jay Dec 2013

Contextual Analysis Of Large-Scale Biomedical Associations For The Elucidation And Prioritization Of Genes And Their Roles In Complex Disease, Jeremy J. Jay

Electronic Theses and Dissertations

Vast amounts of biomedical associations are easily accessible in public resources, spanning gene-disease associations, tissue-specific gene expression, gene function and pathway annotations, and many other data types. Despite this mass of data, information most relevant to the study of a particular disease remains loosely coupled and difficult to incorporate into ongoing research. Current public databases are difficult to navigate and do not interoperate well due to the plethora of interfaces and varying biomedical concept identifiers used. Because no coherent display of data within a specific problem domain is available, finding the latent relationships associated with a disease of interest is …


Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez Dec 2013

Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez

Masters Theses

Thematic maps derived from remote sensing imagery is increasingly being used in environmental and ecological modeling. Spatial information in these maps however is not free of error. Different methodologies such as error matrices are used to assess the accuracy of the spatial information. However, most of the methods commonly used for describing the accuracy assessment of thematic data fail to describe spatial differences of the accuracy across an area of interest. This thesis describes the use of indicator kriging as a geostatistical method for mapping the spatial accuracy of thematic maps. The method is illustrated by constructing accuracy maps for …


A Hadoop Approach To Advanced Sampling Algorithms In Molecular Dynamics Simulation On Cloud Computing, Jin Niu, Shuju Bai, Ebrahim Khosravi, Seung Jong Park Dec 2013

A Hadoop Approach To Advanced Sampling Algorithms In Molecular Dynamics Simulation On Cloud Computing, Jin Niu, Shuju Bai, Ebrahim Khosravi, Seung Jong Park

Computer Science Faculty Research & Creative Works

Cloud computing has emerged as a prevalent computing paradigm with the advantages of virtualization, scalability, fault tolerance, and a usage-based pricing model. It has been widely used in various computational research fields. Replica exchange molecular dynamics (REMD) and replica exchange statistical temperature molecular dynamics (RESTMD) are two sampling algorithms in molecular dynamics. Due to the inherent parallel feature of REMD and RESTMD, it is practical to convert them into cloud computing applications. However, the performance of REMD and RESTMD on clouds has not been extensively investigated. In our work, we implemented REMD and RESTMD in cloud computing environment through Hadoop, …


An Mpi-Enabled Mapreduce Framework For Molecular Dynamics Simulation Applications, Shuju Bai, Ebrahim Khosravi, Seung Jong Park Dec 2013

An Mpi-Enabled Mapreduce Framework For Molecular Dynamics Simulation Applications, Shuju Bai, Ebrahim Khosravi, Seung Jong Park

Computer Science Faculty Research & Creative Works

Computational technologies have been extensively investigated to be applied into many application domains. Since the presence of Hadoop, an implementation of MapReduce framework, scientists have applied it to biological sciences, chemistry, medical sciences, and other areas to efficiently process huge data sets. Although Hadoop is fault-tolerant and processes data in parallel, it does not support MPI in computing. The Map/Reduce tasks in Hadoop have to be serial, which results in inefficient scientific computations wrapped in Map/Reduce tasks. In the real world, many applications require MPI techniques due to their nature. Molecular dynamics simulation is one of them. In our research, …


Afcd: An Approximated-Fair And Controlled-Delay Queuing For High Speed Networks, Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui Hui Chiu, Seung Jong Park Dec 2013

Afcd: An Approximated-Fair And Controlled-Delay Queuing For High Speed Networks, Lin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui Hui Chiu, Seung Jong Park

Computer Science Faculty Research & Creative Works

High speed networks have characteristics of high bandwidth, long queuing delay, and high burstiness which make it difficult to address issues such as fairness, low queuing delay and high link utilization. Current high-speed networks carry heterogeneous TCP flows which makes it even more challenging to address these issues. Since sender centric approaches do not meet these challenges, there have been several proposals to address them at router level via queue management (QM) schemes. These QM schemes have been fairly successful in addressing either fairness issues or large queuing delay but not both at the same time. We propose a new …


A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam Dec 2013

A Bandwidth-Conserving Architecture For Crawling Virtual Worlds, Dipesh Gautam

Graduate Theses and Dissertations

A virtual world is a computer-based simulated environment intended for its users to inhabit via avatars. Content in virtual worlds such as Second Life or OpenSimulator is increasingly presented using three-dimensional (3D) dynamic presentation technologies that challenge traditional search technologies. As 3D environments become both more prevalent and more fragmented, the need for a data crawler and distributed search service will continue to grow. By increasing the visibility of content across virtual world servers in order to better collect and integrate the 3D data we can also improve the crawling and searching efficiency and accuracy by avoiding crawling unchanged regions …


Algorithms For The Implementation Of A Dynamic Energy Pricing Policy, Manek Biswas Dec 2013

Algorithms For The Implementation Of A Dynamic Energy Pricing Policy, Manek Biswas

Theses - ALL

In the upcoming smart grid era, dynamic pricing using primarily data collected from smart meters installed in homes and businesses is a virtual certainty. The possibilities this feature may offer are many, and we examine in this study how subunits of the electricity grid may implement load scheduling given a model for predicting ever-changing energy prices over a day. We present a realistic linear model that utilities may use for implementing dynamic pricing, and argue how accurate prediction of this model by its customers may be profitable both for the utilities and their customers.

The thesis provides algorithms for achieving …


Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen Dec 2013

Coupling Alignments With Recognition For Still-To-Video Face Recognition, Zhiwu Huang, X. Zhao, S. Shan, R. Wang, X. Chen

Research Collection School Of Computing and Information Systems

The Still-to-Video (S2V) face recognition systems typically need to match faces in low-quality videos captured under unconstrained conditions against high quality still face images, which is very challenging because of noise, image blur, low face resolutions, varying head pose, complex lighting, and alignment difficulty. To address the problem, one solution is to select the frames of `best quality' from videos (hereinafter called quality alignment in this paper). Meanwhile, the faces in the selected frames should also be geometrically aligned to the still faces offline well-aligned in the gallery. In this paper, we discover that the interactions among the three tasks-quality …


Efficient Routing For Wireless Mesh Networks Using A Backup Path, Amir Esmailpour, Nidal Nasser, Jehad Al Dallal Dec 2013

Efficient Routing For Wireless Mesh Networks Using A Backup Path, Amir Esmailpour, Nidal Nasser, Jehad Al Dallal

Electrical & Computer Engineering and Computer Science Faculty Publications

Wireless Mesh Network (WMN) has a proven record in providing viable solutions for some of the fundamental issues in wireless networks such as capacity and range limitations. WMN infrastructure includes clusters of Mobile Ad-Hoc Networks (MANETs) connected through a fixed backbone of mesh routers. The mesh network can be constrained severely due to various reasons, which could result in performance degradation such as a drop in throughput or long delays. Solutions to this problem often focus on multipath or multichannel extensions to the existing ad- hoc routing protocols. In this paper, we propose a novel solution by introducing an alternative …


Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph Dec 2013

Conceptual, Impact-Based Publications Recommendations, Ann Smittu Joseph

Graduate Theses and Dissertations

CiteSeerx is a digital library for scientific publications by computer science researchers. It also functions as a search engine with several features including autonomous citation indexing, automatic metadata extraction, full-text indexing and reference linking. Users are able to retrieve relevant documents from the CiteSeerx database directly using search queries and will further benefit if the system suggests document recommendations to the user based on their preferences and search history. Therefore, recommender systems were initially developed and continue to evolve to recommend more relevant documents to the CiteSeerx users. In this thesis, we introduce the Conceptual, Impact-Based Recommender (CIBR), …


An Algorithm For Triangulating 3d Polygons, Ming Zou Dec 2013

An Algorithm For Triangulating 3d Polygons, Ming Zou

All Theses and Dissertations (ETDs)

In this thesis, we present an algorithm for obtaining a triangulation of multiple, non-planar 3D polygons. The output minimizes additive weights, such as the total triangle areas or the total dihedral angles between adjacent triangles. Our algorithm generalizes a classical method for optimally triangulating a single polygon. The key novelty is a mechanism for avoiding non-manifold outputs for two and more input polygons without compromising opti- mality. For better performance on real-world data, we also propose an approximate solution by feeding the algorithm with a reduced set of triangles. In particular, we demonstrate experimentally that the triangles in the Delaunay …


A Social Dimensional Cyber Threat Model With Formal Concept Analysis And Fact-Proposition Inference, Anup Sharma, Robin Gandhi, Qiuming Zhu, William Mahoney, William Sousan Dec 2013

A Social Dimensional Cyber Threat Model With Formal Concept Analysis And Fact-Proposition Inference, Anup Sharma, Robin Gandhi, Qiuming Zhu, William Mahoney, William Sousan

Computer Science Faculty Publications

Cyberspace has increasingly become a medium to express outrage, conduct protests, take revenge, spread opinions, and stir up issues. Many cyber attacks can be linked to current and historic events in the social, political, economic, and cultural (SPEC) dimensions of human conflicts in the physical world. These SPEC factors are often the root cause of many cyber attacks. Understanding the relationships between past and current SPEC events and cyber attacks can help understand and better prepare people for impending cyber attacks. The focus of this paper is to analyze these attacks in social dimensions and build a threat model based …


Virtualizing Intelligent River®: A Comparative Study Of Alternative Virtualization Technologies, Aravindh Sampathkumar Dec 2013

Virtualizing Intelligent River®: A Comparative Study Of Alternative Virtualization Technologies, Aravindh Sampathkumar

All Theses

Emerging cloud computing infrastructure models facilitate a modern and efficient way of utilizing computing resources, enabling applications to scale with varying demands over time. The core enabler of the cloud computing paradigm is virtualization. The concept is not new; virtualization has garnered significant research attention, fostering a race to achieve the lowest possible virtualization overhead. The evolution has led to three primary virtualization approaches: full-virtualization, para-virtualization, and container-based virtualization, each with a unique set of strengths and weaknesses. Thus it becomes important to study and evaluate their quantitative and qualitative differences. The operational requirements of the Intelligent River® middleware system …


Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan Dec 2013

Consumer Adoption Of Health Information Systems, Sankara Subramanian Srinivasan

Graduate Theses and Dissertations

At nearly 18 percent of the country's GDP, the U.S. healthcare industry continues to wrestle with growing cost and a quality of care that does not match the increased spending. The dominant focus to date has been on promoting Health IT (HIT) system implementation and digitizing health records at the provider's end, with scant attention to the role of the patient in the healthcare process. The source of inefficiency in the healthcare system is not only on account of shortcomings at the provider's end but also due to non-compliance (such as failing to adhere to medication advice and follow-up visits) …


A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews Dec 2013

A Solar-Powered And Multi-Tiered Mesh Node For A Portable In Situ Emergency Response System, Adam Matthews

Graduate Theses and Dissertations

The aftermath of a natural disaster is typically characterized by lack of a reliable medium for dissemination of information to survivors. Current state-of-the-art emergency response systems rely on satellite radio-enabled devices, but survivors, unlike first responders, do not have access to such devices. To mitigate this problem, we present PERPETUU a solar-powered portable GIS microserver. The microserver node can be deployed in a disaster scene, and can serve maps to survivors viewable on browsers of off-the-shelf mobile systems. A key innovation in the design of the PERPETUU node is a multi-tiered hardware architecture-the system combines a low-power micro-controller, a medium-power …