Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 120 of 145

Full-Text Articles in Physical Sciences and Mathematics

Visualising Museum Stories, Eoin Kilfeather Jan 2013

Visualising Museum Stories, Eoin Kilfeather

Publications

Storytelling is fundamental to our ability to understand, and find meaning in, the world around us. Stories allow us to organise and share knowledge, and to identify the relationships between objects, events, and experiences. Within museums stories allow visitors to engage with collections and to gain meaningful understanding of museum objects. Stories transform a collection of objects into a meaningful knowledge structure that connects the objects and give them meaning.

This paper describes the Open Source Storyscope system that has been developed by the EU FP7 DECIPHER project. Storyscope's workspace and tools allow museum professionals and visitors to research, develop, …


Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado Dec 2012

Nextgen Flight Deck Data Comm: Auxiliary Synthetic Speech Phase I, Tracy Lennertz, Judith Bürki-Cohen, Andrea L. Sparko, Nickolas D. Macchiarella, Jason Kring, Mike Coman, Tom Haritos, Jeffry Alvarado

Publications

Data Comm—a text-based controller-pilot communication system—is critical to many NextGen improvements. With Data Comm, communication becomes a visual task. Interacting with a visual Data Comm display may yield an unsafe increase in head-down time, particularly for single-pilot operations. This study examined the feasibility of supplementing Data Comm with synthetic speech. To this end, thirty-two pilots flew two experimental scenarios in a Cessna 172 Flight Training Device. In one scenario, ATC communication was with a text-only Data Comm display, in the other, communication was with a text Data Comm display with synthetic speech that read aloud each message (i.e., text+speech). Pilots …


An Infrastructure To Support Data Integration And Curation For Higher Educational Research, Linh B. Ngo, Amy W. Apon, Pengfei Xuan, Kimberley Ferguson, Christin Marshall, John Mccann, Yueli Zheng Oct 2012

An Infrastructure To Support Data Integration And Curation For Higher Educational Research, Linh B. Ngo, Amy W. Apon, Pengfei Xuan, Kimberley Ferguson, Christin Marshall, John Mccann, Yueli Zheng

Publications

The recent challenges for higher education call for research that can offer a comprehensive understanding about the performance and efficiency of higher education institutions in their three primary missions: research, education, and service. In other for this to happen, it is necessary for researchers to have access to a multitude of data sources.However, due to the nature of their academic training, many higher education practitioners do not have access to expertise in working with different data sources. In this work, we describe a design and implementation for an infrastructure that will bring together the tools and the data to provide …


The Influence Of Automation On Aviation Accident And Fatality Rates: 2000-2010, Nicholas A. Koeppen Jul 2012

The Influence Of Automation On Aviation Accident And Fatality Rates: 2000-2010, Nicholas A. Koeppen

Publications

The purpose of this project is to evaluate if technological advances and implementation of automation have produced a decrease in the number and severity of accidents in commercial aviation over the last decade. To accomplish this evaluation historical commercial aviation accident data from 2000 to 2010 will be examined. Commercial fixed wing and rotary wing data will be evaluated. No aviation incident data will be collected; the project will be limited in scope to commercial aviation accidents. Accidents highlighting major deficiencies involving automation will be discussed in detail. To further support the projects purpose, emphasis will be given to evaluate …


Web Supported Emplotment: Using Object And Event Descriptions To Facilitate Storytelling Online And In Galleries, Trevor Collins, Paul Mulholland, Annika Wolff Jan 2012

Web Supported Emplotment: Using Object And Event Descriptions To Facilitate Storytelling Online And In Galleries, Trevor Collins, Paul Mulholland, Annika Wolff

Publications

The process of emplotment refers to the selection of significant events in a story and the identification of pertinent relations between them, in order to produce a plot providing an interpretation of those events. We are investigating how models of emplotment can be applied to develop web-based tools for creating and interpreting narratives. In particular, we are focusing on the process undertaken by art gallery professionals to design and present exhibitions. This paper presents a set of plot relations developed in collaboration with museum professionals from two national galleries in Ireland, and shows how theories of narrative and digital cultural …


Storyspace: A Story-Driven Approach For Creating Musuem Narratives, Annika Wolff, Paul Mulholland, Tevor Collins Jan 2012

Storyspace: A Story-Driven Approach For Creating Musuem Narratives, Annika Wolff, Paul Mulholland, Tevor Collins

Publications

In a curated exhibition of a museum or art gallery, a selection of heritage objects and associated information is presented to a visitor for the purpose of telling a story about them. The same underlying story can be presented in a number of different ways. This paper describes techniques for creating multiple alternative narrative structures from a single underlying story, by selecting different organising principles for the events and plot structures of the story. These authorial decisions can produce different dramatic effects. Storyspace is a web interface to an ontology for describing curatorial narratives. We describe how the narrative component …


Curate And Storyspace: An Ontology And Web-Based Environment For Describing Curatorial Narratives, Paul Mulholland, Annika Wolff, Trevolr Collins Jan 2012

Curate And Storyspace: An Ontology And Web-Based Environment For Describing Curatorial Narratives, Paul Mulholland, Annika Wolff, Trevolr Collins

Publications

focus on describing the heritage objects that the museum holds in its collection. These are used to manage and describe individual heritage objects according to properties such as artist, date and preservation requirements. Curatorial narratives, such as physical or online exhibitions tell a story that spans across heritage objects and have a meaning that does not necessarily reside in the individual heritage objects themselves. Here we present curate, an ontology for describing curatorial narratives. This draws on structuralist accounts that distinguish the narrative from the story and plot, and also a detailed analysis of two museum exhibitions and the curatorial …


An Event-Based Approach To Describing And Understanding Museum Narratives, Paul Mulholland, Annika Wolff, Trevor Collins, Zdenek Zdrahal Jan 2011

An Event-Based Approach To Describing And Understanding Museum Narratives, Paul Mulholland, Annika Wolff, Trevor Collins, Zdenek Zdrahal

Publications

Current museum metadata tends to be focused around the properties of the heritage object such as the artist, style and date of creation. This form of metadata can index a museum’s collection but cannot express the relations between heritage objects and related concepts found in contemporary museum exhibitions. A modern museum exhibition, rather than providing a taxonomic classification of heritage objects, uses them in the construction of curatorial narratives to be interpreted by an audience. In this paper we outline how curatorial narratives can be represented semantically using our Curate Ontology. The Curate Ontology, informed by a detailed analysis of …


Deciphering The Story Of The Musuem, Eoin Kilfeather Jan 2011

Deciphering The Story Of The Musuem, Eoin Kilfeather

Publications

No abstract provided.


Forensic Analysis Of Plug Computers, Scott Conrad, Greg Dorn, Philip Craiger Jan 2011

Forensic Analysis Of Plug Computers, Scott Conrad, Greg Dorn, Philip Craiger

Publications

A plug computer is essentially a cross between an embedded computer and a traditional computer, and with many of the same capabilities. However, the architecture of a plug computer makes it difficult to apply commonly used digital forensic methods. This paper describes methods for extracting and analyzing digital evidence from plug computers. Two popular plug computer models are examined, the SheevaPlug and the Pogoplug.


Accelerating Image Feature Comparisons Using Cuda On Commodity Hardware, Amy Apon, Seth Warn, Wesley Emeneker, John Gauch, Jackson Cothren Jul 2010

Accelerating Image Feature Comparisons Using Cuda On Commodity Hardware, Amy Apon, Seth Warn, Wesley Emeneker, John Gauch, Jackson Cothren

Publications

Given multiple images of the same scene, image registration is the process of determining the correct transformation to bring the images into a common coordinate system—i.e., how the images fit together. Feature based registration applies a transformation function to the input images before performing the correlation step. The result of that transformation, also called feature extraction, is a list of significant points in the images, and the registration process will attempt to correlate these points, rather than directly comparing the input images.


Community Funding Models For Computational Resources, Amy Apon, Jeff Pummill, Dana Brunson May 2010

Community Funding Models For Computational Resources, Amy Apon, Jeff Pummill, Dana Brunson

Publications

As scientific research has extended far beyond the practicality and abilities of laboratory experiments, computational simulations have become the mainstay of enabling and furthering the research in a way never previously thought possible. It is becoming commonplace to model and simulate both the very large, such as black hole collisions in astrophysics, and the very small, such as subatomic particle behavior and interaction in high energy physics. In addition to the previous examples detailing extremes, practically every area of research currently utilizes and benefits from computational resources to simulate their work; financial modeling, weather forecasting, geological phenomena, geo-spatial data analysis, …


High Performance Computing Instrumentation And Research Productivity In U.S. Universities, Amy W. Apon, Linh B. Ngo, Stanley Ahalt, Vijay Dantuluri, Constantin Gurdgiev, Moez Limayem, Michael Stealey Jan 2010

High Performance Computing Instrumentation And Research Productivity In U.S. Universities, Amy W. Apon, Linh B. Ngo, Stanley Ahalt, Vijay Dantuluri, Constantin Gurdgiev, Moez Limayem, Michael Stealey

Publications

This paper studies the relationship between investments in High-Performance Computing (HPC) instrumentation and research competitiveness. Measures of institutional HPC investment are computed from data that is readily available from the Top 500 list, a list that has been published twice a year since 1993 that lists the fastest 500 computers in the world at that time. Institutions that are studied include US doctoral-granting institutions that fall into the very high or high research rankings according to the Carnegie Foundation classifications and additional institutions that have had entries in the Top 500 list. Research competitiveness is derived from federal funding data, …


Book Review: Digital Forensic Evidence Examination, Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination, Gary C. Kessler

Publications

This document is Dr. Kessler's review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-3


Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba Jan 2010

Utilizing The Technology Acceptance Model To Assess The Employee Adoption Of Information Systems Security Measures, Cynthia M. Jones, Richard V. Mccarthy, Leila Halawi, Bahaudin Mujtaba

Publications

In this study, the factors that affect employee acceptance of information systems security measures were examined by extending the Technology Acceptance Model. Partial least squares structural equation modeling was applied to examine these factors. 174 valid responses from employees from companies in various industry segments in the United States and Canada were analyzed. The results of the statistical analysis indicate that subjective norm moderated by management support showed the strongest effect on intention to use information systems security measures.


Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger Jan 2010

Forensic Analysis Of A Playstation 3 Console, Scott Conrad, Greg Dorn, Philip Craiger

Publications

The Sony PlayStation 3 (PS3) is a powerful gaming console that supports Internet-related activities, local file storage and the playing of Blu-ray movies. The PS3 also allows users to partition and install a secondary operating system on the hard drive. This “desktop-like” functionality along with the encryption of the primary hard drive containing the gaming software raises significant issues related to the forensic analysis of PS3 systems. This paper discusses the PS3 architecture and behavior, and provides recommendations for conducting forensic investigations of PS3 systems.


Accelerating Sift On Parallel Architectures, Amy Apon, Seth Warn, Wesley Emeneker, Jackson Cothren Sep 2009

Accelerating Sift On Parallel Architectures, Amy Apon, Seth Warn, Wesley Emeneker, Jackson Cothren

Publications

SIFT is a widely-used algorithm that extracts features from images; using it to extract information from hundreds of terabytes of aerial and satellite photographs requires parallelization in order to be feasible. We explore accelerating an existing serial SIFT implementation with OpenMP parallelization and GPU execution.


Resources - Thinking Small: Nano Small, David Stricker Jan 2009

Resources - Thinking Small: Nano Small, David Stricker

Publications

The article provides information on the "Nanooze" magazine publication. It notes the significance of nanotechnology to the development of latest innovations that come from materials at smallest dimensions or at the nanoscale levels. It presents resources published within the publication that explore the emerging issues in nanotechnology.


Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler Jan 2009

Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp. Information Science Reference, 2009. ISBN: 978-1-60566-326-5.


Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger Jan 2009

Analyzing The Impact Of A Virtual Machine On A Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, Philip Craiger

Publications

As virtualization becomes more prevalent in the enterprise and in personal computing, there is a great need to understand the technology as well as its ramifications for recovering digital evidence. This paper focuses on trace evidence related to the installation and execution of virtual machines (VMs) on a host machine. It provides useful information regarding the types and locations of files installed by VM applications, the processes created by running VMs and the structure and identity of VMs, ancillary files and associated artifacts.


A Performance And Productivity Study Using Mpi, Titanium, And Fortress, Amy Apon, Chris Bryan, Wesley Emeneker Dec 2008

A Performance And Productivity Study Using Mpi, Titanium, And Fortress, Amy Apon, Chris Bryan, Wesley Emeneker

Publications

The popularity of cluster computing has increased focus on usability, especially in the area of programmability. Languages and libraries that require explicit message passing have been the standard. New languages, designed for cluster computing, are coming to the forefront as a way to simplify parallel programming. Titanium and Fortress are examples of this new class of programming paradigms. This papers presents results from a productivity study of these two newcomers with MPI, the de- facto standard for parallel programming.


What A User Wants: Redesigning A Library's Web Site Based On A Card-Sort Analysis, Laura Pope Robbins, Lisa Esposito, Christ Kretz, Michael Aloi Oct 2008

What A User Wants: Redesigning A Library's Web Site Based On A Card-Sort Analysis, Laura Pope Robbins, Lisa Esposito, Christ Kretz, Michael Aloi

Publications

Web site usability concerns anyone with a web site to maintain. Libraries, however, are often the biggest offenders in terms of usability. In our efforts to provide users with everything they need to do research, we often overwhelm them with sites that are confusing in structure, difficult to navigate, and weighed down with jargon. Dowling College Library recently completed a redesign of its web site based upon the concept of usability. For smaller libraries in particular, this can be a challenge. The web site is often maintained by one or two people and finding the time and resources to conduct …


Developing A Coherent Cyberinfrastructure From Local Campus To National Facilities: Challenges And Strategies, Amy Apon, Patrick Dreher, Vijay Agarwala, Stan Ahalt, Guy Almes, Sue Fratkin, Thomas Hauser, Jan Odegard, Jim Pepin, Craig Stewart Jul 2008

Developing A Coherent Cyberinfrastructure From Local Campus To National Facilities: Challenges And Strategies, Amy Apon, Patrick Dreher, Vijay Agarwala, Stan Ahalt, Guy Almes, Sue Fratkin, Thomas Hauser, Jan Odegard, Jim Pepin, Craig Stewart

Publications

A fundamental goal of cyberinfrastructure (CI) is the integration of computing hardware, software, and network technology, along with data, information management, and human resources to advance scholarship and research. Such integration creates opportunities for researchers, educators, and learners to share ideas, expertise, tools, and facilities in new and powerful ways that cannot be realized if each of these components is applied independently. Bridging the gap between the reality of CI today and its potential in the immediate future is critical to building a balanced CI ecosystem that can support future scholarship and research. This report summarizes the observations and recommendations …


An Application Of High Fidelity Ftds For Ab Initio Pilot Training: The Way Ahead, Nickolas D. Macchiarella, Tim Brady, Brandon S. Lyon May 2008

An Application Of High Fidelity Ftds For Ab Initio Pilot Training: The Way Ahead, Nickolas D. Macchiarella, Tim Brady, Brandon S. Lyon

Publications

"Decreases in simulation costs and increases in aircraft training costs led to the need for further investigation into the application of simulation-based training. Researchers conducted an eighteen-month study using ab initio student pilots as participants. This study applied a Federal Aviation Administration (FAA) approved, Part 142, flight-training curriculum that included 60% flight training device (FTD) use. Researchers identified five causal factors that warranted further investigation. The causal factors identified were visual fidelity, procedural similarity, dynamic flight environment, difficulty of task, and visual scanning and response. These causal factors have the potential to affect transfer of training (ToT) from simulated flight …


Capacity Planning Of A Commodity Cluster In An Academic Environment: A Case Study, Linh B. Ngo, Amy W. Apon, Baochuan Lu, Hung Bui, Nathan Hamm, Larry Dowdy, Doug Hoffman, Denny Brewer Apr 2008

Capacity Planning Of A Commodity Cluster In An Academic Environment: A Case Study, Linh B. Ngo, Amy W. Apon, Baochuan Lu, Hung Bui, Nathan Hamm, Larry Dowdy, Doug Hoffman, Denny Brewer

Publications

In this paper, the design of a simulation model for evaluating two alternative supercomputer configurations in an academic environment is presented. The workload is analyzed and modeled, and its effect on the relative performance of both systems is studied. The Integrated Capacity Planning Environment (ICPE) toolkit, developed for commodity cluster capacity planning, is successfully applied to the target environment. The ICPE is a tool for workload modeling, simulation modeling, and what-if analysis. A new characterization strategy is applied to the workload to more accurately model commodity cluster work- loads. Through "what-if" analysis, the sensitivity of the baseline system performance to …


Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler Jan 2008

Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler

Publications

This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.


Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler Jan 2008

Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler

Publications

This document is Dr. Kessler's review of The dotCrime Manifesto: How to Stop Internet Crime, by Phillip Hallam-Baker. Addison-Wesley, 2008. ISBN: 0-321-50358-9


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3


Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh B. Ngo, Amy W. Apon Sep 2007

Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Linh B. Ngo, Amy W. Apon

Publications

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution. Subversion is a version control repository system that allows the creation of fine-grained permissions to files and directories. In this project an infrastructure, Shibbolized Subversion, has been …


Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Amy Apon, Linh B. Ngo Sep 2007

Shibboleth As A Tool For Authorized Access Control To The Subversion Repository System, Amy Apon, Linh B. Ngo

Publications

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution. Subversion is a version control repository system that allows the creation of fine-grained permissions to files and directories. In this project an infrastructure, Shibbolized Subversion, has been …