Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Walden University (447)
- New Jersey Institute of Technology (135)
- California State University, San Bernardino (90)
- San Jose State University (66)
- Singapore Management University (50)
-
- University of South Florida (44)
- Air Force Institute of Technology (43)
- Nova Southeastern University (43)
- University of Arkansas, Fayetteville (38)
- University of Wisconsin Milwaukee (37)
- Governors State University (33)
- California Polytechnic State University, San Luis Obispo (32)
- Dakota State University (32)
- The University of Maine (28)
- University of Massachusetts Amherst (25)
- Western University (21)
- City University of New York (CUNY) (18)
- Purdue University (17)
- CCT College Dublin (16)
- Grand Valley State University (16)
- Old Dominion University (15)
- University of Texas at El Paso (15)
- The University of Akron (14)
- University of New Orleans (14)
- World Maritime University (14)
- Edith Cowan University (13)
- American University in Cairo (12)
- La Salle University (12)
- University of Nevada, Las Vegas (11)
- Brigham Young University (9)
- Keyword
-
- Information technology (54)
- Cybersecurity (42)
- Information Technology (41)
- Machine learning (35)
- Management (31)
-
- Applied sciences (28)
- Database (28)
- Machine Learning (26)
- Security (21)
- Data mining (20)
- Social media (20)
- Strategies (20)
- Project Management (19)
- Technology (19)
- Web site development (19)
- Information science (17)
- Cloud Computing (16)
- Cloud computing (16)
- Database management (16)
- Information retrieval (16)
- Cloud (15)
- Databases (15)
- Innovation (15)
- Leadership (15)
- Web sites Design (15)
- Web sites Design. (15)
- Geographic information systems (14)
- Information security (14)
- Information systems (14)
- Research Project (14)
- Publication Year
- Publication
-
- Walden Dissertations and Doctoral Studies (447)
- Dissertations (107)
- Theses and Dissertations (103)
- Theses Digitization Project (83)
- Master's Projects (66)
-
- Electronic Theses and Dissertations (50)
- Dissertations and Theses Collection (Open Access) (45)
- USF Tampa Graduate Theses and Dissertations (44)
- CCE Theses and Dissertations (42)
- Theses (42)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Doctoral Dissertations (28)
- Electronic Thesis and Dissertation Repository (21)
- Culminating Experience Projects (16)
- ICT (16)
- Master's Theses (15)
- Open Access Theses (15)
- Open Access Theses & Dissertations (15)
- University of New Orleans Theses and Dissertations (14)
- Williams Honors College, Honors Research Projects (14)
- Archived Theses and Dissertations (12)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (11)
- Dissertations, Theses, and Capstone Projects (10)
- Computer Engineering (9)
- Computer Science and Software Engineering (9)
- Dissertations and Theses (9)
- World Maritime University Dissertations (9)
- Honors Theses (8)
- File Type
Articles 1 - 30 of 1592
Full-Text Articles in Physical Sciences and Mathematics
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
Dissertations, Theses, and Capstone Projects
The word “billion” is a mathematical abstraction related to “big,” but it is difficult to understand the vast difference in value between one million and one billion; even harder to understand the vast difference in purchasing power between one billion dollars, and the average U.S. yearly income. Perhaps most difficult to conceive of is what that purchasing power and huge mass of capital translates to in terms of power. This project blends design, text, facts, and figures into an interactive narrative website that helps the user better understand their position in relation to extreme wealth: https://whatdoesonebilliondollarslooklike.website/
The site incorporates …
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green
Student Attitudes And Intentions To Use Continuous Authentication Methods Applied To Mitigate Impersonation Attacks During E-Assessments, Andrea E. Green
CCE Theses and Dissertations
No solution can ultimately eliminate cheating in online courses. However, universities reserve funding for authentication systems to minimize the threat of cheating in online courses. Most higher education institutions use a combination of authentication methods to secure systems against impersonation attacks during online examinations. Authentication technologies ensure that an online course is protected from impersonation attacks. However, it is important that authentication methods secure systems against impersonation attacks with minimal disruption during an examination. Authentication methods applied to secure e-assessments against impersonation attacks may impact a student’s attitude and intentions to use the e-examination system.
In this regard, the research …
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
Damage Detection With An Integrated Smart Composite Using A Magnetostriction-Based Nondestructive Evaluation Method: Integrating Machine Learning For Prediction, Christopher Nelon
Damage Detection With An Integrated Smart Composite Using A Magnetostriction-Based Nondestructive Evaluation Method: Integrating Machine Learning For Prediction, Christopher Nelon
All Dissertations
The development of composite materials for structural components necessitates methods for evaluating and characterizing their damage states after encountering loading conditions. Laminates fabricated from carbon fiber reinforced polymers (CFRPs) are lightweight alternatives to metallic plates; thus, their usage has increased in performance industries such as aerospace and automotive. Additive manufacturing (AM) has experienced a similar growth as composite material inclusion because of its advantages over traditional manufacturing methods. Fabrication with composite laminates and additive manufacturing, specifically fused filament fabrication (fused deposition modeling), requires material to be placed layer-by-layer. If adjacent plies/layers lose adhesion during fabrication or operational usage, the strength …
Data-Centric Image Super-Resolution In Magnetic Resonance Imaging: Challenges And Opportunities, Mamata Shrestha
Data-Centric Image Super-Resolution In Magnetic Resonance Imaging: Challenges And Opportunities, Mamata Shrestha
Graduate Theses and Dissertations
Super-resolution has emerged as a crucial research topic in the field of Magnetic Resonance Imaging (MRI) where it plays an important role in understanding and analysis of complex, qualitative, and quantitative characteristics of tissues at high resolutions. Deep learning techniques have been successful in achieving state-of-the-art results for super-resolution. These deep learning-based methods heavily rely on a substantial amount of data. Additionally, they require a pair of low-resolution and high-resolution images for supervised training which is often unavailable. Particularly in MRI super-resolution, it is often impossible to have low-resolution and high-resolution training image pairs. To overcome this, existing methods for …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Undergraduate Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Making Data Meaningful: Stakeholder Perceptions On Data Visualization And Data Management Practices Within A Multi-Tiered System Of Supports (Mtss), Domenick Saia
Dissertations
Data-driven decision-making and collaboration are core pillars of a multi-tiered system of supports (MTSS); however, timely and accessible data use, as well as data literacy and visualization literacy skills, are challenges school leaders and educators face related to implementing such frameworks. I hypothesized efficient data management systems and data visualization tools enable school teams to predict student learning outcomes, readily communicate, and better understand student data. The purpose of this study design was to highlight a need for more efficient data structures that allow school stakeholders to balance their roles within an MTSS framework more effectively. The context of this …
Big Data Applications And Challenges In Giscience (Case Studies: Natural Disaster And Public Health Crisis Management), Amir Masoud Forati
Big Data Applications And Challenges In Giscience (Case Studies: Natural Disaster And Public Health Crisis Management), Amir Masoud Forati
Theses and Dissertations
This dissertation examines the application and significance of user-generated big data in Geographic Information Science (GIScience), with a focus on managing natural disasters and public health crises. It explores the role of social media data in understanding human-environment interactions and in informing disaster management and public health strategies. A scalable computational framework will be developed to model extensive unstructured geotagged data from social media, facilitating systematic spatiotemporal data analysis.The research investigates how individuals and communities respond to high-impact events like natural disasters and public health emergencies, employing both qualitative and quantitative methods. In particular, it assesses the impact of socio-economic-demographic …
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
USF Tampa Graduate Theses and Dissertations
Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …
Uavs And Deep Neural Networks: An Alternative Approach To Monitoring Waterfowl At The Site Level, Zachary J. Loken
Uavs And Deep Neural Networks: An Alternative Approach To Monitoring Waterfowl At The Site Level, Zachary J. Loken
LSU Master's Theses
Understanding how waterfowl respond to habitat restoration and management activities is crucial for evaluating and refining conservation delivery programs. However, site-specific waterfowl monitoring is challenging, especially in heavily forested systems such as the Mississippi Alluvial Valley (MAV)—a primary wintering region for ducks in North America. I hypothesized that using uncrewed aerial vehicles (UAVs) coupled with deep learning-based methods for object detection would provide an efficient and effective means for surveying non-breeding waterfowl on difficult-to-access restored wetland sites. Accordingly, during the winters of 2021 and 2022, I surveyed wetland restoration easements in the MAV using a UAV equipped with a dual …
A Smart Chatbot System For Digitizing Service Management To Improve Business Continuity, Asraa Mohammed Albeshr
A Smart Chatbot System For Digitizing Service Management To Improve Business Continuity, Asraa Mohammed Albeshr
Theses
Chatbots, also called digital systems that require a natural language-based interface for user interaction, are increasingly being integrated into our daily lives. These chatbots respond intelligently to voice and text and function as sophisticated entities. Its functioning includes the recognition of multiple human languages through the application of Natural Language Processing (NLP) techniques. These chatbots find applications in various areas such as e-commerce services, medical assistance, recommendation systems, and educational purposes. This reflects the versatility and widespread adoption of this technology. AI chatbots play a crucial role in improving IT support in IT Service Management (ITSM) for better business continuity. …
Ship Registry And Flag State Obligations For The Plurinational State Of Bolivia: A Case Study For A Landlocked State, Marco Antonio Lucano Uzquiano
Ship Registry And Flag State Obligations For The Plurinational State Of Bolivia: A Case Study For A Landlocked State, Marco Antonio Lucano Uzquiano
World Maritime University Dissertations
No abstract provided.
Models And Algorithms For Promoting Diverse And Fair Query Results, Md Mouinul Islam
Models And Algorithms For Promoting Diverse And Fair Query Results, Md Mouinul Islam
Dissertations
Ensuring fairness and diversity in search results are two key concerns in compelling search and recommendation applications. This work explicitly studies these two aspects given multiple users' preferences as inputs, in an effort to create a single ranking or top-k result set that satisfies different fairness and diversity criteria. From group fairness standpoint, it adapts demographic parity like group fairness criteria and proposes new models that are suitable for ranking or producing top-k set of results. This dissertation also studies equitable exposure of individual search results in long tail data, a concept related to individual fairness. First, the dissertation focuses …
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Diversification And Fairness In Top-K Ranking Algorithms, Mahsa Asadi
Dissertations
Given a user query, the typical user interfaces, such as search engines and recommender systems, only allow a small number of results to be returned to the user. Hence, figuring out what would be the top-k results is an important task in information retrieval, as it helps to ensure that the most relevant results are presented to the user. There exists an extensive body of research that studies how to score the records and return top-k to the user. Moreover, there exists an extensive set of criteria that researchers identify to present the user with top-k results, and result diversification …
Human-Ai Complex Task Planning, Sepideh Nikookar
Human-Ai Complex Task Planning, Sepideh Nikookar
Dissertations
The process of complex task planning is ubiquitous and arises in a variety of compelling applications. A few leading examples include designing a personalized course plan or trip plan, designing music playlists/work sessions in web applications, or even planning routes of naval assets to collaboratively discover an unknown destination. For all of these aforementioned applications, creating a plan requires satisfying a basic construct, i.e., composing a sequence of sub-tasks (or items) that optimizes several criteria and satisfies constraints. For instance, in course planning, sub-tasks or items are core and elective courses, and degree requirements capture their complex dependencies as constraints. …
Data-Driven 2d Materials Discovery For Next-Generation Electronics, Zeyu Zhang
Data-Driven 2d Materials Discovery For Next-Generation Electronics, Zeyu Zhang
Dissertations
The development of material discovery and design has lasted centuries in human history. After the concept of modern chemistry and material science was established, the strategy of material discovery relies on the experiments. Such a strategy becomes expensive and time-consuming with the increasing number of materials nowadays. Therefore, a novel strategy that is faster and more comprehensive is urgently needed. In this dissertation, an experiment-guided material discovery strategy is developed and explained using metal-organic frameworks (MOFs) as instances. The advent of 7r-stacked layered MOFs, which offer electrical conductivity on top of permanent porosity and high surface area, opened up new …
Data Heterogeneity And Its Implications For Fairness, Ghazaleh Noroozi
Data Heterogeneity And Its Implications For Fairness, Ghazaleh Noroozi
Electronic Thesis and Dissertation Repository
Data heterogeneity, referring to the differences in underlying generative processes that produce the data, presents challenges in analyzing and utilizing datasets for decision-making tasks. This thesis examines the impact of data heterogeneity on biases and fairness in predictive models. The research investigates the correlation between heterogeneity and protected attributes, such as race and gender, and explores the implications of such heterogeneity on biases that may arise in downstream applications.
The contributions of this thesis are fourfold. Firstly, a comprehensive definition of data heterogeneity based on differences in underlying generative processes is provided, establishing a conceptual framework for understanding and quantifying …
On Computing Optimal Repairs For Conditional Independence, Alireza Pirhadi
On Computing Optimal Repairs For Conditional Independence, Alireza Pirhadi
Electronic Thesis and Dissertation Repository
This thesis focuses on the concept of Conditional Independence (CI) and its testing, which holds immense significance across various fields, including economics, social sciences, and biomedical research. Notably, within computer science, CI has become an integral part of building probabilistic and causal models. It aids efficient inference and plays a key role in uncovering causal relationships.
The primary aim of this thesis is to broaden the scope of CI beyond its testing aspect. We introduce the pioneering problem of data repair, designed to adhere to particular CI constraints. The value and pertinence of this problem are highlighted through two contrasting …
Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides
Geospatial Wildfire Risk Prediction Using Deep Learning, Abner Alberto Benavides
Electronic Theses, Projects, and Dissertations
This report introduces a thorough analysis of wildfire prediction using satellite imagery by applying deep learning techniques. To find wildfire-prone geographical data, we use U-Net, a convolutional neural network known for its effectiveness in biomedical image segmentation. The input to the model is the Sentinel-2 multispectral images to supply a complete view of the terrain features.
We evaluated the wildfire risk prediction model’s performance using several metrics. The model showed high accuracy, with a weighted average F1 score of 0.91 and an AUC-ROC score of 0.972. These results suggest that the model is exceptionally good at predicting the location of …
Interposition Based Container Optimization For Data Intensive Applications, Rohan Tikmany
Interposition Based Container Optimization For Data Intensive Applications, Rohan Tikmany
College of Computing and Digital Media Dissertations
Reproducibility of applications is paramount in several scenarios such as collaborative work and software testing. Containers provide an easy way of addressing reproducibility by packaging the application's software and data dependencies into one executable unit, which can be executed multiple times in different environments. With the increased use of containers in industry as well as academia, current research has examined the provisioning and storage cost of containers and has shown that container deployments often include unnecessary software packages. Current methods to optimize the container size prune unnecessary data at the granularity of files and thus make binary decisions. We show …
Analyzing Taxi Drivers’ Decision-Making And Recommending Strategies For Enhanced Performance: A Data-Driven Approach, Mengyu Ji
Dissertations and Theses Collection (Open Access)
This thesis focuses on analyzing the decision-making process of taxi drivers and providing data-driven strategies to enhance their performance. By examin- ing comprehensive historical data encompassing passenger demand patterns, drivers’ spatial dynamics, and fare structures, valuable insights are gained into drivers’ choices regarding optimal routes, timing, and areas with high demand. Integrating real-time information sources, such as GPS data and passenger updates, allows drivers to adapt their strategies dynamically to changing traffic conditions and emerging demand patterns. Predictive analytics models, includ- ing ARIMA, XGBoost, and Linear Regression, are utilized to forecast demand flow at key locations, enabling proactive decision-making and …
Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost
Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost
University Honors Theses
This essay looks to reflect back upon the successes and failures of the EPL Card Reader capstone project, sponsored by Edward Ivory, head of Portland State University's Electronics Prototyping Lab. The EPL Card Reader's goal is to provide a means of tracking and updating student activity and training on the various machines in the lab. Using a local computer port to host this web app a lab administrator or manager is able to scan a student's access badge to review which machines they have been trained on as well as update that training status. The app also has a running …
Digital Transformation In Local Governments: A Case Study Of Abu Dhabi Municipality Transport Department, Alia Sahmi Al Ahbabi
Digital Transformation In Local Governments: A Case Study Of Abu Dhabi Municipality Transport Department, Alia Sahmi Al Ahbabi
Theses
The new generation is rapidly adapting to the digital era, where government and private services are being transformed into electronic services, commonly known as Eservices. Cities are leveraging digitalization to streamline their business processes and business services. This digitalization has improved service delivery time and quality for individuals. With digitalization, business processes align with technology, enhancing performance and customer satisfaction. However, there are challenges associated with digitalization, particularly people working in various municipality departments who find it challenging to adapt to digitization. Employees may take time to adjust to the new techniques and technologies, which may hamper the actions of …
An Efficient Strategy For Deploying Deception Technology, Noora Abdulla Alhosani
An Efficient Strategy For Deploying Deception Technology, Noora Abdulla Alhosani
Theses
Implementations of deception technology is crucial in discovering attacks by creating a controlled and monitored environment for detecting malicious activity. This technology involves the deployment of decoys, traps, and honeypots that mimic natural systems and network assets to attract and identify attackers. The use of deception technology provides an early warning system for detecting cyber-attacks, allowing organizations to respond quickly and mitigate damage. This article proposed a framework that focuses on maximizing the efficiency of deception technology in detecting sophisticated attacks. The framework employs multi-layered deception techniques at various levels of the network, system, and application to provide comprehensive coverage …
Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner
Feature Selection From Clinical Surveys Using Semantic Textual Similarity, Benjamin Warner
McKelvey School of Engineering Theses & Dissertations
Survey data collected from human subjects can contain a high number of features while having a comparatively low quantity of examples. Machine learning models that attempt to predict outcomes from survey data under these conditions can overfit and result in poor generalizability. One remedy to this issue is feature selection, which attempts to select an optimal subset of features to learn upon. A relatively unexplored source of information in the feature selection process is the usage of textual names of features, which may be semantically indicative of which features are relevant to a target outcome. The relationships between feature names …
Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland
Cinema Trends And Viewer Preferences: An Analysis Of Movie Trends, Factors Leading To Box-Office Success, And Viewer Ratings, Brandon Crossland
Analytics Capstones
This research paper investigates the critical factors that impact the success and profitability of feature films in the entertainment industry. The study is divided into two primary parts. The first part aims to identify trends in cinema and predict box office earnings using advanced data analytics techniques. The second part examines user reviews to determine the key factors that influence film viewership. The objective is to provide valuable insights to cinema enthusiasts, film executives, and streaming platforms, helping them make informed decisions on film production and recommendations. The methods utilized include descriptive data visualizations in Excel and Python and predictive …
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
Senior Honors Projects, 2020-current
This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Areas Of Same Cardinal Direction, Periyandy Thunendran
Areas Of Same Cardinal Direction, Periyandy Thunendran
Electronic Theses and Dissertations
Cardinal directions, such as North, East, South, and West, are the foundation for qualitative spatial reasoning, a common field of GIS, Artificial Intelligence, and cognitive science. Such cardinal directions capture the relative spatial direction relation between a reference object and a target object, therefore, they are important search criteria in spatial databases. The projection-based model for such direction relations has been well investigated for point-like objects, yielding a relation algebra with strong inference power. The Direction Relation Matrix defines the simple region-to-region direction relations by approximating the reference object to a minimum bounding rectangle. Models that capture the direction between …
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Master's Theses
In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …