Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood May 2017

Exploiting Semantic Distance In Linked Open Data For Recommendation, Sultan Dawood Alfarhood

Graduate Theses and Dissertations

The use of Linked Open Data (LOD) has been explored in recommender systems in different ways, primarily through its graphical representation. The graph structure of LOD is utilized to measure inter-resource relatedness via their semantic distance in the graph. The intuition behind this approach is that the more connected resources are to each other, the more related they are. One drawback of this approach is that it treats all inter-resource connections identically rather than prioritizing links that may be more important in semantic relatedness calculations. Another drawback of current approaches is that they only consider resources that are connected directly …


Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla May 2017

Dpweka: Achieving Differential Privacy In Weka, Srinidhi Katla

Graduate Theses and Dissertations

Organizations belonging to the government, commercial, and non-profit industries collect and store large amounts of sensitive data, which include medical, financial, and personal information. They use data mining methods to formulate business strategies that yield high long-term and short-term financial benefits. While analyzing such data, the private information of the individuals present in the data must be protected for moral and legal reasons. Current practices such as redacting sensitive attributes, releasing only the aggregate values, and query auditing do not provide sufficient protection against an adversary armed with auxiliary information. In the presence of additional background information, the privacy protection …


Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran May 2016

Data Partitioning Methods To Process Queries On Encrypted Databases On The Cloud, Osama M. Omran

Graduate Theses and Dissertations

Many features and advantages have been brought to organizations and computer users by Cloud computing. It allows different service providers to distribute many applications and services in an economical way. Consequently, many users and companies have begun using cloud computing. However, the users and companies are concerned about their data when data are stored and managed in the Cloud or outsourcing servers. The private data of individual users and companies is stored and managed by the service providers on the Cloud, which offers services on the other side of the Internet in terms of its users, and consequently results in …


Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya Apr 2016

Unsupervised Learning Framework For Large-Scale Flight Data Analysis Of Cockpit Human Machine Interaction Issues, Abhishek B. Vaidya

Open Access Theses

As the level of automation within an aircraft increases, the interactions between the pilot and autopilot play a crucial role in its proper operation. Issues with human machine interactions (HMI) have been cited as one of the main causes behind many aviation accidents. Due to the complexity of such interactions, it is challenging to identify all possible situations and develop the necessary contingencies. In this thesis, we propose a data-driven analysis tool to identify potential HMI issues in large-scale Flight Operational Quality Assurance (FOQA) dataset. The proposed tool is developed using a multi-level clustering framework, where a set of basic …


Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe Oct 2014

Online Simulations For Conceptual Understanding Of Thermoelectric Devices, Maria De Rosario Uribe

Open Access Theses

Computer simulations have been extensively used with educational purposes. However, the successful implementation in order to improve learning has been a matter of debate in research in education. The purpose of this case study is to analyze how a set of computer simulations can improve student understanding of thermoelectric devices. The study was developed in a learning context characterized by the advanced degree of difficulty of the topics treated, the high academic level of education of the students, and the online nature of the learning environment. As part of the course, students were provided with instructional materials that guided the …


The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva Oct 2014

The Indiana Cybersecurity Services Center (Incsc): A Cost-Benefit Analysis For K-12 Schools, Hans Christian Vargas Silva

Open Access Theses

The aim of this thesis is to determine if there are greater benefits than costs associated in the participation of public K-12 school corporations in the Indiana Cybersecurity Services Center (INCSC). This thesis is an ex-antecost-benefit analysis policy assessment of the INCSC. The study consisted of a sample of 6 school corporations from which 5 were classified as small and 1 was large. Three methods were considered for data collection; however conducting interviews was the most effective method due to the interaction with IT personnel from each organization in order to analyze current costs related to 4 areas of …


Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly Jul 2014

Systems For Delivering Electric Vehicle Data Analytics, Vamshi Krishna Bolly

Open Access Theses

n the recent times, advances in scientific research related to electric vehicles led to generation of large amounts of data. This data is majorly logger data collected from various sensors in the vehicle. It is predominantly unstructured and non-relational in nature, also called Big Data. Analysis of such data needs a high performance information technology infrastructure that provides superior computational efficiency and storage capacity. It should be scalable to accommodate the growing data and ensure its security over a network. This research proposes an architecture built over Hadoop to effectively support distributed data management over a network for real-time data …


A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne Jul 2014

A Model-Based Approach To System-Of-Systems Engineering Via The Systems Modeling Language, Kevin Hughes Bonanne

Open Access Theses

In the field of Systems Engineering, a movement is underway to capture the aspects of a system in a centralized model format instead of various documents. This is the basis of Model Based Systems Engineering (MBSE). In order to better formalize this change, the Systems Modeling Language (SysML) was developed to characterize an ontology for MBSE. Despite the growth of both MBSE practices and SysML tools, they have yet to be rigorously analyzed as to their applicability to the field of System-of-Systems (SoS). This thesis applies SysML to a methodology for System-of-Systems Engineering (SoSE) known as the Wave Model, which …


The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu Jul 2014

The Use Of Business Intelligence Techniques In Supply Chain Performance, Jue Gu

Open Access Theses

Who likes data? Businesses are always loyal data followers. Companies analyze various forms of data to maintain businesses and identify their current performance in different areas so they can find business opportunities to improve and obtain more market share in advance (Qrunfleh & Tarafdar, 2012). When Big Data comes to businesses, companies who can take advantage of data the best tend to regularly get more business and customers (Waller & Fawcett, 2013). Collecting, analyzing, and demonstrating data could be essential to a single business, a company's supply chain performance and its sustainability. As an intelligent data processing product in terms …


A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang Jul 2014

A Quantitative Framework Of Skill Evaluation Of It Workforce, O Hyun Hwang

Open Access Theses

Every employee has different abilities as well as experience, leading to different results in terms of skills and job performance. In order to improve employee IT skills, organizations should evaluate their employees' skills to understand the current levels of skills and knowledge and to figure out areas where skills are currently lacking.

This study used a different approach than other existing methods to evaluate the IT skills of employees. The research used quantitative empirical data that represents the work experience of employees based on their task history and job positions. The suggested method defines the relationship between IT skills and …


Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi May 2014

Creating An Information Systems Security Culture Through An Integrated Model Of Employees Compliance, Mohammad I. Merhi

Theses and Dissertations - UTB/UTPA

Employees’ non-compliance with information systems security policies has been identified as a major threat to organizational data and information systems. This dissertation investigates the process underlying information systems security compliance in organizations with the focus on employees. The process model is complex, comprising many normative, attitudinal, psychological, environmental, and organizational factors. Therefore, the study of information security compliance requires a holistic assessment of all these factors. This dissertation seeks to achieve this objective by offering a comprehensive and integrated model of employee behavior especially focused towards information security compliance. The research framework is influenced by the Reciprocal Determinism Theory which …


Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran Apr 2014

Reliability Guided Resource Allocation For Large-Scale Supercomputing Systems, Shruti Umamaheshwaran

Open Access Theses

In high performance computing systems, parallel applications request a large number of resources for long time periods. In this scenario, if a resource fails during the application runtime, it would cause all applications using this resource to fail. The probability of application failure is tied to the inherent reliability of resources used by the application. Our investigation of high performance computing systems operating in the field has revealed a significant difference in the measured operational reliability of individual computing nodes. By adding awareness of the individual system nodes' reliability to the scheduler along with the predicted reliability needs of parallel …


A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte Apr 2014

A Farm Management Information System With Task-Specific, Collaborative Mobile Apps And Cloud Storage Services, Jonathan Tyler Welte

Open Access Theses

Modern production agriculture is beginning to advance beyond deterministic, scheduled operations between relatively few people to larger scale, information-driven efficiency in order to respond to the challenges of field variability and meet the needs of a growing population. Since no two farms are the same with respect to information and management structure, a specialized farm management information system (FMIS) which is tailored to the realities on the ground of individual farms is likely to be more effective than generalized FMIS available today.

This thesis presents the design of a FMIS using proven user-centered design principles. This approach resulted in the …


A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan Apr 2014

A Computer-Based Approach For Identifying Student Conceptual Change, Junchao Yan

Open Access Theses

Misconceptions are commonly encountered in many areas of science and engineering where a to-be-learned concept conflicts with prior knowledge. Conceptual change is an approach for identifying and repairing the misconceptions. One of the ways to promote student conceptual change is providing students with ontological schema training. However, assessment of conceptual change relies on qualitative analysis of student responses. With the exponential growth of qualitative data in the form of graphical representations or written responses, the process of data analysis relying on human experts has become time-consuming and costly. This study took the advantages of natural language processing and machine learning …


A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng Apr 2014

A Sandbox Development For Demonstrating Bom Transmission In A Plm And Erp Integrated System, Zhen Zeng

Open Access Theses

Integrating Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) in a company is important. Currently, many companies have difficulties on integrating PLM and ERP systems. This study developed a prototype (sandbox) of PLM and ERP integrated system for demonstrating BOM transmission in a PLM and ERP integrated system, describing key aspects of system integration and BOM transmission. This sandbox will facilitate users' knowledge on how to process transactions in a PLM and ERP integrated system. The BOM accuracy was examined by comparing BOM data in PLM system to BOM data in ERP system after implementing engineering changes. This study …


Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi Dec 2013

Attitudes And Behaviors In Online Communities: Empirical Studies Of The Effects Of Social, Community, And Individual Characteristics, Richard Kumi

Graduate Theses and Dissertations

Online communities and communities of practice bring people together to promote and support shared goals and exchange information. Personal interactions are important to many of these communities and one of the important outcomes of personal interactions in online communities and communities of practice is user-generated content. The three essays in the current study examines behavior motivation in online communities and communities of practice to understand how Social and personal psychological factors, and user-generated influence attitudes, intentions and behaviors in online communities.

The first essay addresses two research questions. First, how does Social capital influence exchange and combination behaviors in online …


Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti Oct 2013

Improving Reuse In Software Development For The Life Sciences, Nicholas Vincent Iannotti

Open Access Dissertations

The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the availability of tools such as best practice frameworks, the current rate of software development is not able to keep up with the needs of scientists. This bottleneck in software development is largely due to code reuse generally not being applied in practice.

This dissertation presents Legwork, a class library of reuse-optimized design pattern implementations …


Understanding User Resistance To Information Technology: Toward A Comprehensive Model In Health Information Technology, Madison N. Ngafeeson Aug 2013

Understanding User Resistance To Information Technology: Toward A Comprehensive Model In Health Information Technology, Madison N. Ngafeeson

Theses and Dissertations - UTB/UTPA

The successful implementation of health information systems is expected to increase legibility, reduce medical errors, boost the quality of healthcare and shrink costs. Yet, evidence points to the fact that healthcare professionals resist the full use of these systems. Physicians and nurses have been reported to resist the system. Even though resistance to technology has always been identified as key issue in the successful implementation of information technology, the subject remains largely under-theorized and deficient of empirical testing. Only two proposed model have been tested so far. Hence, though user resistance is clearly identified and defined in literature, not very …


A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand May 2013

A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand

Graduate Theses and Dissertations

Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …


Information Measures For Statistical Orbit Determination, Alinda Kenyana Mashiku Jan 2013

Information Measures For Statistical Orbit Determination, Alinda Kenyana Mashiku

Open Access Dissertations

The current Situational Space Awareness (SSA) is faced with a huge task of tracking the increasing number of space objects. The tracking of space objects requires frequent and accurate monitoring for orbit maintenance and collision avoidance using methods for statistical orbit determination. Statistical orbit determination enables us to obtain estimates of the state and the statistical information of its region of uncertainty given by the probability density function (PDF). As even collision events with very low probability are important, accurate prediction of collisions require the representation of the full PDF of the random orbit state. Through representing the full PDF …


Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum Jan 2013

Analysis Of Android Update Packages As A Method To Load Forensic Utilities And Malicious Applications To An Android Device, Mark Lohrum

Open Access Theses

Android devices are extremely popular and are projected to stay popular. Both forensic tools and malware exist designed specifically for Android devices. The purpose of this study is to explore a new method of loading forensic tools and malware to Android devices. This new method is the update module, which is used to install updates to the operating system. This thesis proposed and completed research to test four different custom update packages on three different Android devices. Two of the update packages contain forensic utilities and the other two contain malicious tools. An update package collecting web history using the …


A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle Jan 2013

A Comparative Analysis Of Open Source Storage Area Networks With Esxi 5.1, Robert M. Trinkle

Open Access Theses

Storage Area Networks have increased in popularity with the advancement of virtualization technologies. SANs consist of a central repository of hard disks allowing multiple clients to access and share data over a computer network. In recent years, multiple commercial and open source SAN technologies have been introduced to the market. Unlike commercial products, the open source SAN technologies lack formal documentation and research making implementation best practices scarce. This research analyzed the performance of different SAN architectures and implementation strategies. In addition, this paper expands upon previous research by using current hardware and software technologies. The test results of prominent …


Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan May 2012

Insider Threat Mitigation Models Based On Thresholds And Dependencies, Harini Ragavan

Graduate Theses and Dissertations

Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention mechanisms, sophisticated insiders still continue to attack a database with new techniques. One such technique which remains an advantage for insiders to attack databases is the dependency relationship among data items. This thesis investigates the ways by which an authorized insider detects dependencies in order to perform malicious write operations. The goal is to monitor malicious write operations performed by an insider by taking advantage of dependencies. A term called `threshold' is associated with every data …


Consolidated Study On Query Expansion, Abhishek Biruduraju Dec 2011

Consolidated Study On Query Expansion, Abhishek Biruduraju

UNLV Theses, Dissertations, Professional Papers, and Capstones

A typical day of million web users all over the world starts with a simple query. The quest for information on a particular topic drives them to search for it, and in the pursuit of their info the terms they supply for queries varies from person to person depending on the knowledge they have. With a vast collection of documents available on the web universe it is the onus of the retrieval system to return only those documents that are relevant and satisfy the user’s search requirements. The document mismatch problem is resolved by appending extra query terms to the …


Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave Dec 2011

Study Of Feature Selection Algorithms For Text-Categorization, Kandarp Dave

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis will discuss feature selection algorithms for text-categorization. Feature selection algorithms are very important, as they can make-or-break a categorization engine. The feature selection algorithms that will be discussed in this thesis are Document Frequency, Information Gain, Chi Squared, Mutual Information, NGL (Ng-Goh-Low) coefficient, and GSS (Galavotti-Sebastiani-Simi) coefficient . The general idea of any feature selection algorithm is to determine importance of words using some measure that can keep informative words, and remove non-informative words, which can then help the text-categorization engine categorize a document, D , into some category, C . These feature selection methods are explained, implemented, …


Processj: A Process-Oriented Programming Language, Matthew Sowders Dec 2011

Processj: A Process-Oriented Programming Language, Matthew Sowders

UNLV Theses, Dissertations, Professional Papers, and Capstones

Java is a general purpose object-oriented programming language that has been widely adopted. Because of its high adoption rate and its lineage as a C-style language, its syntax is familiar to many programmers. The downside is that Java is not natively concurrent. Volumes have been written about concurrent programming in Java; however, concurrent programming is difficult to reason about within an object-oriented paradigm and so is difficult to get right.

occam -π is a general purpose process-oriented programming language. Concurrency is part of the theoretical underpinnings of the language. Concurrency is simple to reason about within an occam -π application …


Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church Dec 2010

Two Essays On The Accounting Treatment For Information Technology Expenditures, Kimberly Swanson Church

Graduate Theses and Dissertations

The current accounting measurement and reporting system is ill-equipped to provide intangible investment information that is decision useful for stakeholders in the information economy. Potentially relevant intangible items are not reported on the balance sheet, since current standards mandate the immediate expensing of these intangible items. Presumably FASB's uncertainty with the fundamental issues of extent and timing of future benefits to the firm has led to concerns with relevance, reliability, and objectivity of capitalizing some intangibles, which results in potential long term value generating expenditures being immediately expensed on the income statement. Prior research has demonstrated extent and timing of …


Asp -Pricing: A Black -Scholes Option Pricing Formulation, Chaitanya Singh Apr 2002

Asp -Pricing: A Black -Scholes Option Pricing Formulation, Chaitanya Singh

Doctoral Dissertations

The Applications Service Provider (ASP) arrangement has engendered a revolution in the area of corporate information technology (IT) by transforming software from a packaged off-the-shelf product to an on-line virtual service.

The focus of this study is to establish a sound mathematical foundation for evaluating software rental agreements (embedding exit flexibility) by incorporating a real options framework (based upon the Black-Scholes approach) into the traditional capital budgeting technique. The static discounted cash flow or net present value analysis may not adequately serve as a ‘barometer’ of outsourcing value due to its inherent weaknesses. On the other hand, the options approach …