Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Physical Sciences and Mathematics

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang Dec 2012

Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …


Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win Dec 2012

Tteleconsultation Technology And Its Benefits: In The Case Of Public Hospitals In Malaysia, Nurazean Maarop, Sukdershan Hazara Singh, Khin Than Win

Dr Khin Win

The ultimate objectives of this study are to describe teleconsultation activities and explore the benefits of teleconsultation technology in the context of public health care environment in Malaysia. The materials of this study were based on an exploratory mixed method studies involving semi-structured interviews with key informants and questionnaires survey of health care providers to obtain information about existing teleconsultation activities as well as to uncover the benefits of teleconsultation technology. The notable benefits from teleconsultation implementation were further discussed. The findings confirmed that teleconsultation service has improved health care delivery in the underserved areas to consult with specialist. One …


Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish Dec 2012

Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish

Yasmeen Shorish

This article describes the fundamental challenges to data curation, how these challenges may be compounded for smaller institutions, and how data management is an essential and manageable component of data curation. Data curation is often discussed within the confines of large, research universities. As a result, master’s and baccalaureate institutions may be left with the impression that they cannot engage with data curation. However, by proactively engaging with faculty, libraries of all sizes can build closer relationships and help educate faculty on data documentation and organization best practices. Experiences from one master’s comprehensive institution as it engages with data management …


P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun Dec 2012

P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun

Associate Professor Ghassan Beydoun

This paper presents a storage model named Peer to Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little’s law, we prove that the speed and availability of P2CP is generally better than that of the pure Peer to Peer (P2P) model, the Peer to Server, Peer (P2SP) model or the cloud model. A key feature of our P2CP is that it has three data transmission tunnels: the cloud-user data transmission tunnel, the clients’ data transmission tunnel, and the common data transmission tunnel. P2CP uses the cloud storage system as a common storage system. When …


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun Dec 2012

P2cp: A New Cloud Storage Model To Enhance Performance Of Cloud Services, Zhe Sun, Jun Shen, Ghassan Beydoun

Dr Jun Shen

This paper presents a storage model named Peer to Cloud and Peer (P2CP). Assuming that the P2CP model follows the Poisson process or Little’s law, we prove that the speed and availability of P2CP is generally better than that of the pure Peer to Peer (P2P) model, the Peer to Server, Peer (P2SP) model or the cloud model. A key feature of our P2CP is that it has three data transmission tunnels: the cloud-user data transmission tunnel, the clients’ data transmission tunnel, and the common data transmission tunnel. P2CP uses the cloud storage system as a common storage system. When …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Enterprise Systems Manager, Edward Aractingi Sep 2012

Enterprise Systems Manager, Edward Aractingi

Edward Aractingi

Presentation on the need of remote systems administration.


Linux 101: Ci-Trainseminar, Edward Aractingi Sep 2012

Linux 101: Ci-Trainseminar, Edward Aractingi

Edward Aractingi

An overview of how the Linux operating system.


Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe Sep 2012

Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe

Edward Aractingi

Marshall University is a state-funded university in Huntington, West Virginia. Like many universities, it is a large organization with multiple and diverse units (colleges, departments, centers, etc.) and depends on data to run efficiently. Much of this data is used by multiple entities. To better manage the needed data collected by the university, the Marshall University Geographic Information System (MUGIS) has been developed. MUGIS will address several needs of Marshall University’s principal stakeholders. Stakeholders include the university administration, faculty, and students. One of the first applications developed for MUGIS was an interactive campus map. This Web-based application is intended to …


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs Sep 2012

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Edward Aractingi

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs Sep 2012

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Allen Taylor

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


A Survey Of Schema Matching Research, Roger Blake Aug 2012

A Survey Of Schema Matching Research, Roger Blake

Roger H. Blake

Schema matching is the process of developing semantic matches between two or more schemas. The purpose of schema matching is generally either to merge two or more databases, or to enable queries on multiple, heterogeneous databases to be formulated on a single schema (Doan and Halevy 2005). This paper develops a taxonomy of schema matching approaches, classifying them as being based on a combination schema matching technique and the type of data used by those techniques. Schema matching techniques are categorized as being based on rules, learning, or ontology, and the type of data used is categorized as being based …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu Jul 2012

Shortest Path Computation With No Information Leakage, Kyriakos Mouratidis, Man Lung Yiu

Kyriakos MOURATIDIS

Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location …


Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis Jul 2012

Enhancing Access Privacy Of Range Retrievals Over B+Trees, Hwee Hwa Pang, Jilian Zhang, Kyriakos Mouratidis

Kyriakos MOURATIDIS

Users of databases that are hosted on shared servers cannot take for granted that their queries will not be disclosed to unauthorized parties. Even if the database is encrypted, an adversary who is monitoring the I/O activity on the server may still be able to infer some information about a user query. For the particular case of a B+-tree that has its nodes encrypted, we identify properties that enable the ordering among the leaf nodes to be deduced. These properties allow us to construct adversarial algorithms to recover the B+-tree structure from the I/O traces generated by range queries. Combining …


Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jul 2012

Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig Mar 2012

Incremental Dcop Search Algorithms For Solving Dynamic Dcop Problems, William Yeoh, Pradeep Varakantham, Xiaoxun Sun, Sven Koenig

Dr Xiaoxun Sun

Distributed constraint optimization problems (DCOPs) are well-suited for modeling multi-agent coordination problems. However, most research has focused on developing algorithms for solving static DCOPs. In this paper, we model dynamic DCOPs as sequences of (static) DCOPs with changes from one DCOP to the next one in the sequence. We introduce the ReuseBounds procedure, which can be used by any-space ADOPT and any-space BnB-ADOPT to find cost-minimal solutions for all DCOPs in the sequence faster than by solving each DCOP individually. This procedure allows those agents that are guaranteed to remain unaffected by a change to reuse their lower and upper …


Mixing Them Up: Group Work With Nesb Students, Mark Freeman Mar 2012

Mixing Them Up: Group Work With Nesb Students, Mark Freeman

Dr Mark Freeman

This paper describes the implementation of a Problem-Based Learning assessment in a postgraduate ICT fundamentals subject. With an entirely international student cohort drawn from 14 countries, many students had never participated in group work. To facilitate student adjustment into the Australian educational environment, and develop understanding of the role and importance of group work, students were educated in group work theory prior to engaging in the group work process. The experiences of both teaching staff and students identified a number of positive outcomes resulting from this approach.


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …


Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss Mar 2012

Modeling And Analysis Of Multi-Hop Control Networks, Alur Rajeev, Alessandro D'Innocenzo, Karl H. Johansson, George James Pappas, Gera Weiss

George J. Pappas

We propose a mathematical framework, inspired by the Wireless HART specification, for modeling and analyzing multi-hop communication networks. The framework is designed for systems consisting of multiple control loops closed over a multi-hop communication network. We separate control, topology, routing, and scheduling and propose formal syntax and semantics for the dynamics of the composed system. The main technical contribution of the paper is an explicit translation of multi-hop control networks to switched systems. We describe a Mathematica notebook that automates the translation of multihop control networks to switched systems, and use this tool to show how techniques for analysis of …


Designer Satellite Collisions From Covert Cyber War, Jan Kallberg Feb 2012

Designer Satellite Collisions From Covert Cyber War, Jan Kallberg

Jan Kallberg

Outer space has enjoyed two decades of fairly peaceful development since the Cold War, but once again it is becoming more competitive and contested, with increased militarization. Therefore, it is important the United States maintain its space superiority to ensure it has the capabilities required by modern warfare for successful operations. Today is different from earlier periods of space development,1 because there is not a blatantly overt arms race in space,2 but instead a covert challenge to US interests in maintaining superiority, resilience, and capability. A finite number of states consider themselves geopolitical actors; however, as long as the United …


Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador Dec 2011

Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador

Angela M Labrador

Archaeological database management systems serve the basic and important functions of ordering, archiving, and disseminating archaeological data. The increased availability of computers and data storage over the past two decades has enabled the exponential growth of archaeological databases and data models. Despite their importance and ubiquity, archaeological database systems are rarely the subject of theoretical analysis within the discipline due to their ‘‘black box’’ nature and the perceived objectivity of computerized systems. Inspired by H. Martin Wobst’s meditations on materiality and disciplinary ethics, in this paper I explore how archaeological database systems structure archaeological interpretation and disciplinary practice. In turn, …


Support System For Novice Researchers (Ssnr): Usability Evaluation Of The First Use, Maizatul Akmar Ismail Dec 2011

Support System For Novice Researchers (Ssnr): Usability Evaluation Of The First Use, Maizatul Akmar Ismail

Maizatul Akmar Ismail

Scholars make use of research output in the form of conference proceedings, journal and theses as references as guideline in generating new knowledge for the use of future generations. Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information on relevant literature, institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. The result of the implementation of SSNR shows significant information that can be utilized by novice researchers in accelerating research process. Thus, this …


Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello Dec 2011

Prescriptive System For Performance Information Management System, Dr. Dipo Theophilus Akomolafe Mbcs, Mncs, Mcpn,, B A. Onyekwelu Mrs, Oniyide Bello

Dr. Dipo Theophilus Akomolafe MBCS, MNCS, MCPN,

Information can be briefly defined as processed data. Information is crucial to the success of any organization because it must be exchanged in one form or the other before activities can be carried out. However, too much information can be overwhelming and lead to poor decision-making. Further, as organizations face an ever-growing wave of digital data, they need to analyze that data and make timely decisions to achieve effective management .Formerly, information was viewed simply as a means of expression, they now serve as the foundation for an organization’s effectiveness and efficiency. Additionally, increased pressures to manage information appropriately, communicate …


A Grid Enabled E-Theses And Dissertations Repository System, Maizatul Akmar Ismail Dec 2011

A Grid Enabled E-Theses And Dissertations Repository System, Maizatul Akmar Ismail

Maizatul Akmar Ismail

Some of the universities in Malaysia are still implementing hybrid Electronic Theses and Dissertations (ETD) approach in managing Theses and Dissertations (TD). One of the limitations of the hybrid ETD approach is its online cataloguing method, which is only available at the physical location of the TD instead of enabling the information to be retrieved online. Maintaining the performance and the data accessing rate of an ETD system has become challenging, due in part to the high number of scholars who utilise and access the system. In order to allow remote access and maintain the services such as scalability, accessibility, …