Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (10)
- Chemistry (5)
- Information Security (4)
- Education (2)
- Mathematics (2)
-
- Other Computer Sciences (2)
- Science and Mathematics Education (2)
- Analytical Chemistry (1)
- Astrophysics and Astronomy (1)
- Computer Engineering (1)
- Curriculum and Instruction (1)
- Digital Communications and Networking (1)
- Earth Sciences (1)
- Educational Assessment, Evaluation, and Research (1)
- Engineering (1)
- Geochemistry (1)
- Graphics and Human Computer Interfaces (1)
- Online and Distance Education (1)
- Organic Chemistry (1)
- Other Mathematics (1)
- Physical Chemistry (1)
- Systems Architecture (1)
- The Sun and the Solar System (1)
- Theory and Algorithms (1)
- Keyword
-
- Security (2)
- Ultrasound (2)
- 1 (1)
- 3-S (1)
- Air gap (1)
-
- Amberlyst-15 (1)
- Anomaly IDS (1)
- Arduino (1)
- Assistive technology; 3D auditory feedback; user study (1)
- Awareness (1)
- Catalysis (1)
- Charter Schools (1)
- Computer Skills (1)
- Concurrency Models (1)
- Cross Entropy (1)
- Cyber (1)
- Cyber Schools (1)
- Data (1)
- Data exfiltration (1)
- E-learning (1)
- ELearning (1)
- EOCT (1)
- Enzyme kinetics (1)
- Evidence preservation (1)
- Facebook (1)
- Family of Problems (1)
- Genetic Algorithm (1)
- Gunshot residue (1)
- High Performance Computing (1)
- IDS (1)
Articles 1 - 17 of 17
Full-Text Articles in Physical Sciences and Mathematics
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
Master of Science in Information Technology Theses
Social media plays an essential role in the modern society, enabling people to be better connected to each other and creating new opportunities for businesses. At the same time, social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate security risks. Users are an integral part of any security mix. In this thesis, we explore the relationship between users’ security perceptions and their actual behavior on social networking sites. Protection motivation theory (PMT), initially …
Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar
Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar
Master of Science in Computer Science Theses
Data Mining is the extraction of valuable information from the patterns of data and turning it into useful knowledge. Data preprocessing is an important step in the data mining process. The quality of the data affects the result and accuracy of the data mining results. Hence, Data preprocessing becomes one of the critical steps in a data mining process.
In the research of text mining, document classification is a growing field. Even though we have many existing classifying approaches, Naïve Bayes Classifier is good at classification because of its simplicity and effectiveness. The aim of this paper is to identify …
A Comparison Of Online And Face-To-Face Achievement In Physical Science, Lisa F. Mozer
A Comparison Of Online And Face-To-Face Achievement In Physical Science, Lisa F. Mozer
Doctor of Education in Instructional Technology Dissertations
ABSTRACT
This study provided a descriptive analysis of learning outcomes in both online and face-to-face grades 9-12 physical science courses. Archived data from a single school system were used for a comparative analysis of learning outcomes in high school physical science between students enrolled in online classes and students enrolled in face-to-face classes. The study compared two years of summative assessment scores of two student groups and, overall, found equality between the two learning environments. Online learning outcomes and face-to-face learning outcomes were similar for both school years, 2013-2014 and 2014-2015. The overall comparison between learning environments was further examined …
Efficacy Of Math Video Tutorials On Student Perception And Achievement, Carol R. Kahrmann
Efficacy Of Math Video Tutorials On Student Perception And Achievement, Carol R. Kahrmann
Doctor of Education in Teacher Leadership Dissertations
Abstract
The purpose of this mixed methods research study is to explore how teacher-made video tutorials in one middle school mathematics classroom are being used and what enables/impedes their effectiveness. A quantitative, quasi-experimental design investigates how video tutorial usage relates to students’ self-efficacy and achievement in mathematics. The sample consisted of 55 students in the experimental group and 65 students in the control group. Results found parents wanted the tutorials even if they did not view them. Students did actually use the video tutorials for remediation and learning. Videos longer than ten minutes impeded the effectiveness of the videos. The …
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
Master of Science in Information Technology Theses
Web application security is a definite threat to the world’s information technology infrastructure. The Open Web Application Security Project (OWASP), generally defines web application security violations as unauthorized or unintentional exposure, disclosure, or loss of personal information. These breaches occur without the company’s knowledge and it often takes a while before the web application attack is revealed to the public, specifically because the security violations are fixed. Due to the need to protect their reputation, organizations have begun researching solutions to these problems. The most widely accepted solution is the use of an Intrusion Detection System (IDS). Such systems currently …
Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri
Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri
Master of Science in Computer Science Theses
Computational power made available by current technology has been continuously increasing, however today’s problems are larger and more complex and demand even more computational power. Interest in computational problems has also been increasing and is an important research area in computer science. These complex problems are solved with computational models that use an underlying mathematical model and are solved using computer resources, simulation, and are run with High Performance Computing. For such computations, parallel computing has been employed to achieve high performance. This thesis identifies families of problems that can best be solved using modelling and implementation techniques of parallel …
Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj
Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj
Master of Science in Computer Science Theses
This thesis presents color image segmentation as a vital step of image analysis in computer vision. A survey of the Markov Random Field (MRF) with four different implementation methods for its parameter estimation is provided. In addition, a survey of swarm intelligence and a number of swarm based algorithms are presented. The MRF model is used for color image segmentation in the framework. This thesis introduces a new image segmentation implementation that uses the bee algorithm as an optimization tool in the Markovian framework. The experiments show that the new proposed method performs faster than the existing implementation methods with …
Perceived Effectiveness Of E-Learning For Technology Instruction In Public Library Staff Development Programs: A Survey Based On The Technology Acceptance Model, Julia Huprich
Master of Science in Information Technology Theses
The purpose of this research study was to determine the perceived effectiveness of e-learning for staff members in public libraries. In addition, the effects of user demographics - including a user’s age and gender - were analyzed to determine if these factors impacted the perceived effectiveness of e-learning as a training delivery model.
Davis’s Technology Acceptance Model (1989) was used to develop a questionnaire related to the perceived effectiveness and value of e-learning, and a survey of public library staff members across the United States was conducted. Results of the survey showed the impact that previous e-learning experience and the …
Towards Understanding And Developing Virtual Environments To Increase Accessibilities For People With Visual Impairments, Miao Dong
Master of Science in Computer Science Theses
The primary goal of this research is to investigate the possibilities of utilizing audio feedback to support effective Human-Computer Interaction Virtual Environments (VEs) without visual feedback for people with Visual Impairments. Efforts have been made to apply virtual reality (VR) technology for training and educational applications for diverse population groups, such as children and stroke patients. Those applications had already shown effects of increasing motivations, providing safer training environments and more training opportunities. However, they are all based on visual feedback. With the head related transfer functions (HRTFs), it is possible to design and develop considerably safer, but diversified training …
A New 2,1,3-Benzothiadiazole-Fused N-Heterocyclic Carbene And Its Metal Complexes, Ossie J. Buckner
A New 2,1,3-Benzothiadiazole-Fused N-Heterocyclic Carbene And Its Metal Complexes, Ossie J. Buckner
Master of Science in Chemical Sciences Theses
In the last few decades, N-heterocyclic carbenes (NHCs) have emerged as a powerful class of carbon-based ligands. Owing to their unique electronic and steric properties, they have been incorporated in a large variety of catalytically active metal complexes. One of the strategies that have been used to modify the ligand properties of NHCs is annulation with different carbo- and heterocyclic groups. It has been shown that annulation in the 4-5 position of the imidazole ring significantly influences the stability and the σ-donor/π- acceptor properties of the carbene species, and this may be used as a versatile tool for the fine-tuning …
Lead-Free Gunshot Residues As Forensic Evidence, Lashaundra A. Fambro
Lead-Free Gunshot Residues As Forensic Evidence, Lashaundra A. Fambro
Master of Science in Chemical Sciences Theses
The analysis of gunshot residue (GSR) has been forensically relevant for many years and several methods are well characterized in scientific literature. However, the manufacture and distribution of lead-free alternatives to small caliber firearms ammunition is increasing rapidly as these types of rounds are more environmentally friendly and safer for use in indoor shooting ranges. Removing lead-containing compounds (e.g., lead styphnate) from the primer mixture eliminates a significant chemical marker vital to the legal precedent governing GSR analysis. The American Society for Testing and Materials (ASTM) standard ASTM E1588-95 is no longer applicable to such residues. With this emerging market, …
Isothermal Titration Calorimetry Uncovers Substrate Promiscuity Of Bicupin Oxalate Oxidase, Hassan Ali Rana
Isothermal Titration Calorimetry Uncovers Substrate Promiscuity Of Bicupin Oxalate Oxidase, Hassan Ali Rana
Master of Science in Chemical Sciences Theses
Oxalate oxidase from Ceriporiopsis subvermispora (CsOxOx) is a manganese-dependent enzyme that catalyzes the oxygen-dependent oxidation of oxalate to form two moles of carbon dioxide and one mole of hydrogen peroxide. CsOxOx is the first oxalate oxidase reported to have a two beta barrel architecture (bicupin). The CsOxOx catalyzed oxidation of oxalate reaction can be monitored by coupling the product H2O2 to the horseradish peroxidase-catalyzed oxidation of 2,2'-azinobis-(3- ethylbenzthiazoline-6-sulphonic acid) and by membrane inlet mass spectrometry. Coupled enzyme assays often confound data interpretation. Isothermal titration calorimetry (ITC) measures heat changes that occur during a reaction. Therefore, ITC can …
Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov
Internet Of Things-Based Smart Classroom Environment, Amir R. Atabekov
Master of Science in Computer Science Theses
Internet of Things (IoT) is a novel paradigm that is gaining ground in the Computer Science field. There’s no doubt that IoT will make our lives easier with the advent of smart thermostats, medical wearable devices, connected vending machines and others. One important research direction in IoT is Resource Management Systems (RMS). In the current state of RMS research, very few studies were able to take advantage of indoor localization which can be very valuable, especially in the context of smart classrooms. For example, indoor localization can be used to dynamically generate seat map of students in a classroom. Indoor …
Synthetic Methods For The Preparation Of 1,3-S,O-Esters, Α-Phosphonovinyl Triflates, And Α-Alkynylphosphonates, David P. Kercher
Synthetic Methods For The Preparation Of 1,3-S,O-Esters, Α-Phosphonovinyl Triflates, And Α-Alkynylphosphonates, David P. Kercher
Master of Science in Chemical Sciences Theses
A broad and systematic study was conducted on synthetic methods to efficiently synthesize 1,3-S,O-esters, α-phosphonovinyl triflates, and α-alkynylphosphonates under mild reaction conditions. The master’s thesis is composed of two projects; the first project is titled “Synthesis of 1,3-S,O-Esters” and the second project is titled “Synthesis of α-Phosphonovinyl Triflates and α-Alkynylphosphonates.” The first project outlines a synthetic route to conveniently prepare novel α-functionalized 1,3-S,O-esters via an acid-promoted hydrolysis of α-functionalized α-oxoketene dimethylthioacetals. The second project, unrelated to the first project, primarily focuses on extensive synthetic methodology developed to prepare …
Understanding The Surface Induced Phosphorylation Of Prebiotic Molecules By Schreibersite, Danna Qasim
Understanding The Surface Induced Phosphorylation Of Prebiotic Molecules By Schreibersite, Danna Qasim
Master of Science in Chemical Sciences Theses
The study of the surface of a meteoritic mineral, schreibersite (Fe,Ni)3P, was investigated to provide insight into the role of the mineral’s surface in aqueous-phase phosphorylation reactions. The optimization of a custom-designed ultrahigh vacuum (UHV) apparatus and Fe2NiP (schreibersite) surface was performed to permit surface science analysis. The bare surface was characterized by scanning electron microscopy (SEM) coupled with energy dispersive X-ray spectroscopy (EDS) and X-ray photoelectron spectroscopy (XPS), which showed some oxidation and segregation of phosphorous within the near-surface region. The interaction and/or reaction of water (H2O), methanol (CH3OH), formic acid …
Ultrasonic Data Transmission And Steganography, Hunter Young
Ultrasonic Data Transmission And Steganography, Hunter Young
KSU Journey Honors College Capstones and Theses
This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information …
Ultrasonic Data Steganography, Alexander Orosz Edwards
Ultrasonic Data Steganography, Alexander Orosz Edwards
KSU Journey Honors College Capstones and Theses
What started off as a question on the possibly of data transmission via sound above the level of human hearing evolved into a project exploring the possibility of ultrasonic data infiltration and exfiltration in an information security context. It is well known that sound can be used to transmit data as this can be seen in many old technologies, most notably and simply DTMF tones for phone networks. But what if the sound used to transmit signals was in in the ultrasonic range? It would go generally unnoticed to anyone not looking for it with tools such as a spectrum …