Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (8)
- Computer Engineering (3)
- Information Security (3)
- Applied Mathematics (2)
- Civil Engineering (2)
-
- Civil and Environmental Engineering (2)
- Databases and Information Systems (2)
- Numerical Analysis and Scientific Computing (2)
- Operations Research, Systems Engineering and Industrial Engineering (2)
- Other Computer Sciences (2)
- Physics (2)
- Theory and Algorithms (2)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Business (1)
- Business Administration, Management, and Operations (1)
- Electrical and Computer Engineering (1)
- Health Information Technology (1)
- Management Sciences and Quantitative Methods (1)
- Medicine and Health Sciences (1)
- Nuclear (1)
- Numerical Analysis and Computation (1)
- Nursing (1)
- Operational Research (1)
- Other Civil and Environmental Engineering (1)
- Philosophy (1)
- Philosophy of Science (1)
- Probability (1)
- Institution
- Publication
-
- Electronic Thesis and Dissertation Repository (3)
- Australian Information Security Management Conference (1)
- Australian Information Warfare and Security Conference (1)
- Computational Modeling & Simulation Engineering Theses & Dissertations (1)
- Computer Science Faculty Publications (1)
-
- Doctoral Dissertations (1)
- Electronic Theses and Dissertations (1)
- Graduate College Dissertations and Theses (1)
- Masters Theses (1)
- Physics Faculty Publications (1)
- Tammy R Toscos (1)
- Theses and Dissertations (1)
- Turkish Journal of Electrical Engineering and Computer Sciences (1)
- UBT International Conference (1)
- USF Tampa Graduate Theses and Dissertations (1)
- Wilson A Higashino (1)
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Computer Sciences
Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling
Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling
Tammy R Toscos
Enhanced access and continuity are key components of patient-centered care. Existing studies show that several interventions such as providing same day appointments, walk-in services, after-hours care, and group appointments, have been used to redesign the healthcare systems for improved access to primary care. However, an intervention focusing on a single component of care delivery (i.e. improving access to acute care) might have a negative impact other components of the system (i.e. reduced continuity of care for chronic patients). Therefore, primary care clinics should consider implementing multiple interventions tailored for their patient population needs. We collected rapid ethnography and observations to …
Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço
Performance Indicators Analysis Inside A Call Center Using A Simulation Program, Ditila Ekmekçiu, Markela Muça, Adrian Naço
UBT International Conference
This paper deals with and shows the results of different performance indicators analyses made utilizing the help of Simulation and concentrated on dimensioning problems of handling calls capacity in a call center. The goal is to measure the reactivity of the call center’s performance to potential changes of critical variables. The literature related to the employment of this kind of instrument in call centers is reviewed, and the method that this problem is treated momentarily is precisely described. The technique used to obtain this paper’s goal implicated a simulation model using Arena Contact Center software that worked as a key …
Tropical Cyclone Wind Hazard Assessment For Southeast Part Of Coastal Region Of China, Sihan Li
Tropical Cyclone Wind Hazard Assessment For Southeast Part Of Coastal Region Of China, Sihan Li
Electronic Thesis and Dissertation Repository
Tropical cyclone (TC) or typhoon wind hazard and risk are significant for China. The return period value of the maximum typhoon wind speed is used to characterize the typhoon wind hazard and assign wind load in building design code. Since the historical surface observations of typhoon wind speed are often scarce and of short period, the typhoon wind hazard assessment is often carried out using the wind field model and TC track model. For a few major cities in the coastal region of mainland China, simple or approximated wind field models and a circular subregion method (CSM) have been used …
Using Cellular Automata And Lattice Boltzmann Methods To Model Cancer Growth: Analysis Of Combination Treatment Outcomes, Jenna L. Butler
Using Cellular Automata And Lattice Boltzmann Methods To Model Cancer Growth: Analysis Of Combination Treatment Outcomes, Jenna L. Butler
Electronic Thesis and Dissertation Repository
In Canada it is estimated that 76,600 people will die of cancer in 2014. Cancer, a collection of over 200 diseases, has differences existing between globally, between individuals and overtime in one individual. Treatment options are similarly varied. These differences make selecting the best possible treatment for every type of cancer very challenging. In addition, with no single cure for cancer, treatments are often combined in different ways to form the best overall option. In an attempt to synthesize the properties of these diseases into a collection of common cellular changes, Hanahan and Weinberg proposed ``the hallmarks of cancer" -- …
Computational Framework For Small Animal Spect Imaging: Simulation And Reconstruction, Sang Hyeb Lee
Computational Framework For Small Animal Spect Imaging: Simulation And Reconstruction, Sang Hyeb Lee
Doctoral Dissertations
Small animal Single Photon Emission Computed Tomography (SPECT) has been an invaluable asset in biomedical science since this non-invasive imaging technique allows the longitudinal studies of animal models of human diseases. However, the image degradation caused by non-stationary collimator-detector response and single photon emitting nature of SPECT makes it difficult to provide a quantitative measure of 3D radio-pharmaceutical distribution inside the patient. Moreover, this problem exacerbates when an intra-peritoneal X-ray contrast agent is injected into a mouse for low-energy radiotracers.
In this dissertation, we design and develop a complete computational framework for the entire SPECT scan procedure from the radio-pharmaceutical …
An Approach To Artificial Society Generation For Video Games, Bryan Sarlo
An Approach To Artificial Society Generation For Video Games, Bryan Sarlo
Electronic Thesis and Dissertation Repository
Since their inception in the 1940s, video games have always had a need for non-player characters (NPCs) driven by some form of artificial intelligence (AI). More recently, researchers and developers have attempted to create believable, or human-like, agents by modeling them after humans by borrowing concepts from the social sciences. This thesis explores an approach to generating a society of such believable agents with human-like attributes and social connections. This approach allows agents to form various kinds of relationships with other agents in the society, and even provides an introductory form of shared or influenced attributes based on their spouse …
Toward A Theory Of Multi-Method Modeling And Simulation Approach, Mariusz A. Balaban
Toward A Theory Of Multi-Method Modeling And Simulation Approach, Mariusz A. Balaban
Computational Modeling & Simulation Engineering Theses & Dissertations
The representation via simulation models can easily lead to simulation models too simple for their intended purpose, or with too much detail, making them hard to understand. This problem is related to limitations of the modeling and simulation methods. A multi-method Modeling and Simulation (M&S) approach has the potential for improved representation by taking advantage of methods' strengths and mitigating their weaknesses. Despite a high appeal for using multiple M&S methods, several related problems should be addressed first. The current level of theoretical, methodological, and pragmatic knowledge related to a multi-method M&S approach is limited. It is problematic that there …
Active Tile Self-Assembly And Simulations Of Computational Systems, Daria Karpenko
Active Tile Self-Assembly And Simulations Of Computational Systems, Daria Karpenko
USF Tampa Graduate Theses and Dissertations
Algorithmic self-assembly has been an active area of research at the intersection of computer science, chemistry, and mathematics for almost two decades now, motivated by the natural self-assembly mechanism found in DNA and driven by the desire for precise control of nanoscale material manufacture and for the development of nanocomputing and nanorobotics. At the theoretical core of this research is the Abstract Tile Assembly Model (aTAM), the original abstract model of DNA tile self-assembly. Recent advancements in DNA nanotechnology have been made in developing strand displacement mechanisms that could allow DNA tiles to modify themselves during the assembly process by …
Modeling And Simulation Of Evacuation Plan For Hancock Stadium, Nirmal Neranjan Weerasekara
Modeling And Simulation Of Evacuation Plan For Hancock Stadium, Nirmal Neranjan Weerasekara
Theses and Dissertations
The goal of this study is to use Modeling and Simulation of Evacuation Plan (MSEP) to support management to execute proper evacuation plan in case of emergency at Hancock Stadium in Illinois State University. Analyses of the research literature and evacuation scenarios are used to build a simulation system that will connect a description of emergency and evacuation situation with its context. It shows how an evacuation plan actually functions. The results of the study will help safety managers to understand the current situations of evacuation according to the specific simulation scenarios. The evacuation simulation is categorized according to the …
An Embodied Approach To Evolving Robust Visual Classifiers, Karol Zieba
An Embodied Approach To Evolving Robust Visual Classifiers, Karol Zieba
Graduate College Dissertations and Theses
From the very creation of the term by Czech writer Karel Capek in 1921, a "robot" has been synonymous with an artificial agent possessing a powerful body and cogitating mind. While the fields of Artificial Intelligence (AI) and Robotics have made progress into the creation of such an android, the goal of a cogitating robot remains firmly outside the reach of our technological capabilities. Cognition has proved to be far more complex than early AI practitioners envisioned. Current methods in Machine Learning have achieved remarkable successes in image categorization through the use of deep learning. However, when presented with novel …
The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet
The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet
Australian Information Security Management Conference
Mobile Ad Hoc Networks (MANETS) promise much in the ability to rapidly deploy a wireless network in a fashion where no prior planning is needed and the network can be running efficiently and with high security within minutes. Natural disaster response, military, education and business provide areas where MANETS can offer significant advantages in communication where infrastructure networks may take days to set up or may be impossible to implement. This research reviews a selection of MANET protocols to show the progression of the research and the issues that are yet to be addressed. It discusses the challenges to researchers …
Modeling Social Norms In Real-World Agent-Based Simulations, Rahmatollah Beheshti
Modeling Social Norms In Real-World Agent-Based Simulations, Rahmatollah Beheshti
Electronic Theses and Dissertations
Studying and simulating social systems including human groups and societies can be a complex problem. In order to build a model that simulates humans' actions, it is necessary to consider the major factors that affect human behavior. Norms are one of these factors: social norms are the customary rules that govern behavior in groups and societies. Norms are everywhere around us, from the way people handshake or bow to the clothes they wear. They play a large role in determining our behaviors. Studies on norms are much older than the age of computer science, since normative studies have been a …
The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull
The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull
Australian Information Warfare and Security Conference
Cyber resilience is characterised by an ability to understand and adapt to changing network conditions, including cyber attacks. Cyber resilience may be characterised by an effects-based approach to missions or processes. One of the fundamental preconditions underpinning cyber resilience is an accurate representation of current network and machine states and what missions they are supporting. This research outlines the need for an ontological network representation, drawing on existing literature and implementations in the domain. This work then introduces an open-source ontological representation for modelling cyber assets for the purposes of Computer Network Defence. This representation encompasses computers, network connectivity, users, …
High-Performance Simulations Of Coherent Synchrotron Radiation On Multicore Gpu And Cpu Platforms, B. Terzić, A. Godunov, K. Arumugam, D. Ranjan, M. Zubair
High-Performance Simulations Of Coherent Synchrotron Radiation On Multicore Gpu And Cpu Platforms, B. Terzić, A. Godunov, K. Arumugam, D. Ranjan, M. Zubair
Physics Faculty Publications
Coherent synchrotron radiation (CSR) is an effect of self-interaction of an electron bunch as it traverses a curved path. It can cause a significant emittance degradation and microbunching. We present a new high-performance 2D, particle-in-cell code which uses massively parallel multicore GPU/GPU platforms to alleviate computational bottlenecks. The code formulates the CSR problem from first principles by using the retarded scalar and vector potentials to compute the self-interaction fields. The speedup due to the parallel implementation on GPU/CPU platforms exceeds three orders of magnitude, thereby bringing a previously intractable problem within reach. The accuracy of the code is verified against …
Cyber Security Research Frameworks For Coevolutionary Network Defense, George Daniel Rush
Cyber Security Research Frameworks For Coevolutionary Network Defense, George Daniel Rush
Masters Theses
"Cyber security is increasingly a challenge for organizations everywhere. Defense systems that require less expert knowledge and can adapt quickly to threats are strongly needed to combat the rise of cyber attacks. Computational intelligence techniques can be used to rapidly explore potential solutions while searching in a way that is unaffected by human bias.
Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation …
Tetrahedral Image-To-Mesh Conversion Software For Anatomic Modeling Of Arteriovenous Malformations, Fotis Drakopoulos, Ricardo Ortiz, Andinet Enquobahrie, Deanna Sasaki-Adams, Nikos Chrisochoides
Tetrahedral Image-To-Mesh Conversion Software For Anatomic Modeling Of Arteriovenous Malformations, Fotis Drakopoulos, Ricardo Ortiz, Andinet Enquobahrie, Deanna Sasaki-Adams, Nikos Chrisochoides
Computer Science Faculty Publications
We describe a new implementation of an adaptive multi-tissue tetrahedral mesh generator targeting anatomic modeling of Arteriovenous Malformation (AVM) for surgical simulations. Our method, initially constructs an adaptive Body-Centered Cubic (BCC) mesh of high quality elements. Then, it deforms the mesh surfaces to their corresponding physical image boundaries, hence, improving the mesh fidelity and smoothness. Our deformation scheme, which builds upon the ITK toolkit, is based on the concept of energy minimization, and relies on a multi-material point-based registration. It uses non-connectivity patterns to implicitly control the number of the extracted feature points needed for the registration, and thus, adjusts …
Impact Of Large-Scale Installation Of Led Lamps In A Distribution System, Sohel Uddin, Hussain Sharef, Olav Krause, Azah Mohamed, Mohammad Abdul Hannan, Naz Niamul Islam
Impact Of Large-Scale Installation Of Led Lamps In A Distribution System, Sohel Uddin, Hussain Sharef, Olav Krause, Azah Mohamed, Mohammad Abdul Hannan, Naz Niamul Islam
Turkish Journal of Electrical Engineering and Computer Sciences
The aim of this paper was to examine the utilization of a large number of nonlinear light emitting diode (LED) lamps in a distribution system and its impact on system power quality. Initially, harmonic and others electrical characteristics were identified by carrying out an experiment on four types of LED lamps available on the local market. On the basis of the identified characteristics, a new LED lamp model was developed in MATLAB Simulink. This model is called the time-dependent current source model and gives more accurate results than the fixed current source model. Then this model was applied to a …
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Cepsim: A Simulator For Cloud-Based Complex Event Processing, Wilson Higashino, Miriam Capretz, Luiz Bittencourt
Wilson A Higashino
As one of the Vs defining Big Data, data velocity brings many new challenges to traditional data processing approaches. The adoption of cloud environments in complex event processing (CEP) systems is a recent architectural style that aims to overcome these challenges. Validating cloud-based CEP systems at the required Big Data scale, however, is often a laborious, error-prone, and expensive task. This article presents CEPSim, a new simulator that has been developed to facilitate this validation process. CEPSim extends CloudSim, an existing cloud simulator, with an application model based on directed acyclic graphs that is used to represent continuous CEP queries. …