Open Access. Powered by Scholars. Published by Universities.®

Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Mathematics

A Trust-Based Secure Service Discovery (Tssd) Model For Pervasive Computing, Sheikh Iqbal Ahamed, Moushumi Sharmin Dec 2008

A Trust-Based Secure Service Discovery (Tssd) Model For Pervasive Computing, Sheikh Iqbal Ahamed, Moushumi Sharmin

Mathematics, Statistics and Computer Science Faculty Research and Publications

To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this paper, we present a trust-based secure Service discovery model, TSSD (trust-based secure service discovery) for a truly pervasive environment. Our model is a hybrid one that allows both secure and non-secure discovery of services. This model allows Service discovery and …


Ubi-App: A Ubiquitous Application For Universal Access From Handheld Devices, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed Nov 2008

Ubi-App: A Ubiquitous Application For Universal Access From Handheld Devices, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

Universal access from a handheld device (such as a PDA, cell phone) at any time or anywhere is now a reality. Ubicomp Assistant (UA) (Sharmin et al. in Proceedings of the 21st annual ACM symposium on applied computing (ACM SAC 2006), Dijon, France, pp 1013–1017, 2006) is an integral service of MARKS (Sharmin et al. in Proceedings of the third international conference on information technology: new generations (ITNG 2006), Las Vegas, Nevada, USA, pp 306–313, 2006). It is a middleware developed for handheld devices, and has been designed to accommodate different types of users (e.g., education, healthcare, marketing, or business). …


A Poisson-Like Model Of Sub-Clinical Signs From The Examination Of Healthy Aging Subjects, Stephen Merrill, Barbara Myklebust, Joel B. Myklebust, Norman Reynolds, Edmund Duthie Aug 2008

A Poisson-Like Model Of Sub-Clinical Signs From The Examination Of Healthy Aging Subjects, Stephen Merrill, Barbara Myklebust, Joel B. Myklebust, Norman Reynolds, Edmund Duthie

Mathematics, Statistics and Computer Science Faculty Research and Publications

Background and aims: Our studies of the standard neurological examination on 66 middle-aged (50–64 yrs) and elderly subjects (65–84 yrs) demonstrate that healthy elders have neurological deficits (or “signs”) that are not associated with specific known neurological disease. The purpose of the current study is to describe this loss of neurological function in healthy aging subjects as seen through accumulated subclinical neurological signs present.

Methods: Logistic regression is applied to the data on each of six signs. Parameters determined are used to describe the distribution of first occurrence times for each sign. The results are then used to construct a …


Architecture And Implementation Of A Trust Model For Pervasive Applications, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Sailaja Bulusu, Mehrab Monjur Jun 2008

Architecture And Implementation Of A Trust Model For Pervasive Applications, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Sailaja Bulusu, Mehrab Monjur

Mathematics, Statistics and Computer Science Faculty Research and Publications

Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device's initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester's context information, …


An Impregnable Lightweight Device Discovery (Ildd) Model For The Pervasive Computing Environment Of Enterprise Applications, Munirul H. Haque, Sheikh Iqbal Ahamed Apr 2008

An Impregnable Lightweight Device Discovery (Ildd) Model For The Pervasive Computing Environment Of Enterprise Applications, Munirul H. Haque, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

The worldwide use of handheld devices (personal digital assistants, cell phones, etc.) with wireless connectivity will reach 2.6 billion units this year and 4 billion by 2010. More specifically, these handheld devices have become an integral part of industrial applications. These devices form pervasive ad hoc wireless networks that aide in industry applications. However, pervasive computing is susceptible and vulnerable to malicious active and passive snoopers. This is due to the unavoidable interdevice dependency, as well as a common shared medium, very transitory connectivity, and the absence of a fixed trust infrastructure. In order to ensure security and privacy in …


Molecular Targets Of 2,3,7,8-Tetrachlorodibenzo-P-Dioxin (Tcdd) Within The Zebrafish Ovary: Insights Into Tcdd-Induced Endocrine Disruption And Reproductive Toxicity, Tisha C. King Heiden, Craig Struble, Matthew L. Rise, Martin J. Hessner, Reinhold J. Hutz, Michael J. Carvan Iii Jan 2008

Molecular Targets Of 2,3,7,8-Tetrachlorodibenzo-P-Dioxin (Tcdd) Within The Zebrafish Ovary: Insights Into Tcdd-Induced Endocrine Disruption And Reproductive Toxicity, Tisha C. King Heiden, Craig Struble, Matthew L. Rise, Martin J. Hessner, Reinhold J. Hutz, Michael J. Carvan Iii

Mathematics, Statistics and Computer Science Faculty Research and Publications

TCDD is a reproductive toxicant and endocrine disruptor, yet the mechanisms by which it causes these reproductive alterations are not fully understood. In order to provide additional insight into the molecular mechanisms that underlie TCDD's reproductive toxicity, we assessed TCDD-induced transcriptional changes in the ovary as they relate to previously described impacts on serum estradiol concentrations and altered follicular development in zebrafish. In silico computational approaches were used to correlate candidate regulatory motifs with observed changes in gene expression. Our data suggest that TCDD inhibits follicle maturation via attenuated gonadotropin responsiveness and/or depressed estradiol biosynthesis, and that interference of estrogen-regulated …


Empirical Bayes And Hierarchical Bayes Estimation Of Skew Normal Populations, Naveen K. Bansal, Mehdi Maadooliat, Xiaowei Wang Jan 2008

Empirical Bayes And Hierarchical Bayes Estimation Of Skew Normal Populations, Naveen K. Bansal, Mehdi Maadooliat, Xiaowei Wang

Mathematics, Statistics and Computer Science Faculty Research and Publications

We develop empirical and hierarchical Bayesian methodologies for the skew normal populations through the EM algorithm and the Gibbs sampler. A general concept of skewness to the normal distribution is considered throughout. Motivations are given for considering the skew normal population in applications, and an example is presented to demonstrate why the skew normal distribution is more applicable than the normal distribution for certain applications.


Pathos: Pervasive At Home Sleep Monitoring, Ian Obermiller, Sheikh Iqbal Ahamed Jan 2008

Pathos: Pervasive At Home Sleep Monitoring, Ian Obermiller, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

Sleeping disorders affect a large percentage of the population, and many of them go undiagnosed each year because the method of diagnosis is to stay overnight at a sleep center. Because pervasive technologies have become so prevalent and affordable, sleep monitoring is no longer confined to a permanent installation, and can therefore be brought directly into the user home. We present a unique solution to the problem of home sleep monitoring that has the possibility to take the place of and expand on the data from a sleep center. PATHOS focuses not only on analyzing patterns during the night, but …


Characterization Of Digraphs With Equal Domination Graphs And Underlying Graphs, Kim A. S. Factor, Larry J. Langley Jan 2008

Characterization Of Digraphs With Equal Domination Graphs And Underlying Graphs, Kim A. S. Factor, Larry J. Langley

Mathematics, Statistics and Computer Science Faculty Research and Publications

A domination graph of a digraph D , dom(D)dom(D), is created using the vertex set of D and edge {u,v}∈E[dom(D)]{u,v}∈E[dom(D)] whenever (u,z)∈A(D)(u,z)∈A(D) or (v,z)∈A(D)(v,z)∈A(D) for every other vertex z∈V(D)z∈V(D). The underlying graph of a digraph DD, UG(D)UG(D), is the graph for which D is a biorientation. We completely characterize digraphs whose underlying graphs are identical to their domination graphs, UG(D)=dom(D)UG(D)=dom(D). The maximum and minimum number of single arcs in these digraphs, and their characteristics, is given.