Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Engineering

Institution
Keyword
Publication Year
Publication

Articles 1 - 28 of 28

Full-Text Articles in Library and Information Science

Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu Oct 2022

Digital Readiness Of Container Terminals For Digital Technology Adoption: A Case Study Of Vietnam, Anh Tuấn Vu

World Maritime University Dissertations

No abstract provided.


The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu Oct 2022

The Impact Of The Digital Maturity Level On Port Operations In Africa, Joyce Wanjiru Kaburu

World Maritime University Dissertations

No abstract provided.


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri Oct 2021

Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri

USF Tampa Graduate Theses and Dissertations

Visualization is crucial in today’s data-driven world to augment and enhance human understanding and decision-making. Effective visualizations must support accuracy in visual task performance and expressive data communication. Effective visualization design depends on the visual channels used, chart types, or visual tasks. However, design choices and visual judgment are co-related, and effectiveness is not one-dimensional, leading to a significant need to understand the intersection of these factors to create optimized visualizations. Hence, constructing frameworks that consider both design decisions and the task being performed enables optimizing visualization design to maximize efficacy. This dissertation describes experiments, techniques, and user studies to …


Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King Jan 2021

Orientation And Social Influences Matter: Revisiting Neutralization Tendencies In Information Systems Security Violation, Frank Curtis King

CCE Theses and Dissertations

It is estimated that over half of all information systems security breaches are due directly or indirectly to the poor security practices of an organization’s employees. Previous research has shown neutralization techniques as having influence on the intent to violate information security policy. In this study, we proposed an expansion of the neutralization model by including the effects of business and ethical orientation of individuals on their tendencies to neutralize and compromise with information security policy. Additionally, constructs from social influences and pressures have been integrated into this model to measure the impact on the intent to violate information security …


Improving Employees’ Compliance With Password Policies, Enas Albataineh Jan 2021

Improving Employees’ Compliance With Password Policies, Enas Albataineh

CCE Theses and Dissertations

Employees’ lack of compliance with password policies increases password susceptibility, which leads to financial damages to the organizations as a result of information disclosure, fraud, and unauthorized transactions. However, few studies have examined what motivates employees to comply with password policies.

The purpose of this quantitative cross-sectional study was to examine what factors influence employees’ compliance with password policies. A theoretical model was developed based on Protection Motivation Theory (PMT), General Deterrence Theory (GDT), Theory of Reasoned Action (TRA), and Psychological Ownership Theory to explain employees’ compliance with password policies.

A non-probability convenience sample was employed. The sample consisted of …


Patients’ Needs And Preferences Regarding Radiology Test Results On Patient Portals, Mansour Abdulaziz Almanaa May 2020

Patients’ Needs And Preferences Regarding Radiology Test Results On Patient Portals, Mansour Abdulaziz Almanaa

Theses and Dissertations

Introduction and significance: Radiology exams are an important part of health care. To enhance the quality of health care, health care services need to be delivered in ways that meet patients’ needs and preferences. Patients were found to be interested in the timely receipt of radiology test results. One of the easiest and fastest ways to deliver radiology test results to patients is via online patient portals. It seems, however, that the method of providing radiology test results through patient portals has not reached its full maturity; it still needs a great deal of improvement. Therefore, participation of the end-readers …


An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz Jan 2018

The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz

Open Access Theses & Dissertations

Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.

The computation offloading decision problem has been widely …


Learning Convolutional Neural Network For Face Verification, Elaheh Rashedi Jan 2018

Learning Convolutional Neural Network For Face Verification, Elaheh Rashedi

Wayne State University Dissertations

Convolutional neural networks (ConvNet) have improved the state of the art in many applications. Face recognition tasks, for example, have seen a significantly improved performance due to ConvNets. However, less attention has been given to video-based face recognition. Here, we make three contributions along these lines.

First, we proposed a ConvNet-based system for long-term face tracking from videos. Through taking advantage of pre-trained deep learning models on big data, we developed a novel system for accurate video face tracking in the unconstrained environments depicting various people and objects moving in and out of the frame. In the proposed system, we …


Essays On Empirical Operations Management In Retail Sales And Service, Youran Fu Jan 2018

Essays On Empirical Operations Management In Retail Sales And Service, Youran Fu

Publicly Accessible Penn Dissertations

This dissertation studies empirical operational problems in retail sales and service systems through three essays. We are in the middle of a remarkable rise in data analytics as available data, as well as the capability of artificial intelligence grows exponentially. This dissertation demonstrates how we can use traditional econometrics and cutting-edge machine learning models to provide data analytics for retail operations management. The first essay studies the value of unstructured social media text data in forecasting future fashion demands several months out, at a granular style-color level. Using recent advancement in natural language processing and machine learning techniques, we show …


Resource-Efficient Scheduling Of Multiprocessor Mixed-Criticality Real-Time Systems, Jaewoo Lee Jan 2017

Resource-Efficient Scheduling Of Multiprocessor Mixed-Criticality Real-Time Systems, Jaewoo Lee

Publicly Accessible Penn Dissertations

Timing guarantee is critical to ensure the correctness of embedded software systems that

interact with the physical environment. As modern embedded real-time systems evolves,

they face three challenges: resource constraints, mixed-criticality, and multiprocessors. This

dissertation focuses on resource-efficient scheduling techniques for mixed-criticality systems

on multiprocessor platforms.

While Mixed-Criticality (MC) scheduling has been extensively studied on uniprocessor plat-

forms, the problem on multiprocessor platforms has been largely open. Multiprocessor al-

gorithms are broadly classified into two categories: global and partitioned. Global schedul-

ing approaches use a global run-queue and migrate tasks among processors for improved

schedulability. Partitioned scheduling approaches use per …


Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden Jan 2017

Improving Search Ranking Using A Composite Scoring Approach, Larry D. Snedden

UNF Graduate Theses and Dissertations

In this thesis, the improvement to relevance in computerized search results is studied. Information search tools return ranked lists of documents ordered by the relevance of the documents to the user supplied search. Using a small number of words and phrases to represent complex ideas and concepts causes user search queries to be information sparse. This sparsity challenges search tools to locate relevant documents for users. A review of the challenges to information searches helps to identify the problems and offer suggestions in improving current information search tools. Using the suggestions put forth by the Strategic Workshop on Information Retrieval …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Out From Darkness And Into The Light: The Role Of Transparency And Social Media In Government, Frances Nichols Bachstein Aug 2016

Out From Darkness And Into The Light: The Role Of Transparency And Social Media In Government, Frances Nichols Bachstein

Doctoral Dissertations

Government agencies that protect secrecy often have a difficult time connecting to the public. Secretive, or perceived secretive government organizations often fall into the nebulous realm of uncertainty for the information consumer. This results in a great deal of misinformation and disinformation being thought of as correct. Since 2008, the US government is moving toward a more transparent, open, and easily accessed information base through social media. Agencies across the government are adopting types of social media communication. However, bureaus that primarily focus on security and safeguarding secrets struggle with how much disclose, which platforms of social media are the …


Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins Aug 2016

Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins

Open Access Dissertations

As precision agriculture transitions into decision agriculture, data driven decision- making has become the focus of the industry and data quality will be increasingly important. Traditionally, yield data cleaning techniques have removed individual data points based on criteria primarily focused on the yield values. However, when these methods are used, the underlying causes of the errors are often overlooked and as a result, these techniques may fail to remove all of the inaccurate data or remove “good” data. As part of this research, an alternative to data cleaning was developed. Data integrity zones (DIZ) within each field were identified by …


A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park Jan 2015

A Prediction Modeling Framework For Noisy Welding Quality Data, Junheung Park

Wayne State University Dissertations

Numerous and various research projects have been conducted to utilize historical manufacturing process data in product design. These manufacturing process data often contain data inconsistencies, and it causes challenges in extracting useful information from the data. In resistance spot welding (RSW), data inconsistency is a well-known issue. In general, such inconsistent data are treated as noise data and removed from the original dataset before conducting analyses or constructing prediction models. This may not be desirable for every design and manufacturing applications since every data can contain important information to further explain the process. In this research, we propose a prediction …


Unveiling Hidden Values Of Optimization Models With Metaheuristic Approach, Ann Kuo Jan 2014

Unveiling Hidden Values Of Optimization Models With Metaheuristic Approach, Ann Kuo

Publicly Accessible Penn Dissertations

Considering that the decision making process for constrained optimization problem is based on modeling, there is always room for alternative solutions because there is usually a gap between the model and the real problem it depicts. This study looks into the problem of finding such alternative solutions, the non-optimal solutions of interest for constrained optimization models, the SoI problem. SoI problems subsume finding feasible solutions of interest (FoIs) and infeasible solutions of interest (IoIs). In all cases, the interest addressed is post-solution analysis in one form or another. Post-solution analysis of a constrained optimization model occurs after the model has …


A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr Jan 2014

A Federated Architecture For Heuristics Packet Filtering In Cloud Networks, Ibrahim M. Waziri Jr

Electronic Theses and Dissertations

The rapid expansion in networking has provided tremendous opportunities to access an unparalleled amount of information. Everyone connects to a network to gain access and to share this information. However when someone connects to a public network, his private network and information becomes vulnerable to hackers and all kinds of security threats. Today, all networks needs to be secured, and one of the best security policies is firewall implementation.

Firewalls can be hardware or cloud based. Hardware based firewalls offer the advantage of faster response time, whereas cloud based firewalls are more flexible. In reality the best form of firewall …


Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge Oct 2013

Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge

Open Access Dissertations

The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.

There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …


Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang Feb 2013

Semantics-Based Automated Quality Assessment Of Depression Treatment Web Documents, Yanjun Zhang

Electronic Thesis and Dissertation Repository

The past decade has witnessed a dramatic expansion in the amount of publicly available health care information on the Web. The health care information on the web, however, is of extremely variable quality. The evaluation of content quality is a big challenge because non-automated methods for information content rating can be easily overwhelmed by the huge data volume. This study proposes an automated approach for assessing the quality of web health care information through comparing the text content with evidence-based health care recommendations. This method relies on semantic analysis and text classification to identify the presentation of evidence-based recommendations in …


A Framework For Personalized Dynamic Cross-Selling In E-Commerce Retailing, Arun K. Timalsina Jan 2012

A Framework For Personalized Dynamic Cross-Selling In E-Commerce Retailing, Arun K. Timalsina

Wayne State University Dissertations

Cross-selling and product bundling are prevalent strategies in the retail sector. Instead of static bundling offers, i.e. giving the same offer to everyone, personalized dynamic cross-selling generates targeted bundle offers and can help maximize revenues and profits. In resolving the two basic problems of dynamic cross-selling, which involves selecting the right complementary products and optimizing the discount, the issue of computational complexity becomes central as the customer base and length of the product list grows. Traditional recommender systems are built upon simple collaborative filtering techniques, which exploit the informational cues gained from users in the form of product ratings and …


Study Of Stemming Algorithms, Savitha Kodimala Dec 2010

Study Of Stemming Algorithms, Savitha Kodimala

UNLV Theses, Dissertations, Professional Papers, and Capstones

Automated stemming is the process of reducing words to their roots. The stemmed words are typically used to overcome the mismatch problems associated with text searching.


In this thesis, we report on the various methods developed for stemming. In particular, we show the effectiveness of n-gram stemming methods on a collection of documents.


The Relationship Between Information Technology And Construction Productivity, Dong Zhai Jan 2010

The Relationship Between Information Technology And Construction Productivity, Dong Zhai

University of Kentucky Doctoral Dissertations

Over the past decades, information technology has been impacting industries, economics, the way of life and even the culture throughout the world. Productivity has been attracting much attention as an important indicator of economics, and numerous researchers have investigated the relationship between information technology and productivity. Construction is one of the largest industries in the United States, but little research has been conducted to investigate the relationship between information technology and construction productivity.

The major objective of this dissertation is to determine the degree (if any) to which information technology usage, specifically the use of information technology to automate and …


Effects On Digital Image Quality When Photographing Through A Transparent Material Used To Hold Or Flatten An Original Object, Paul E. Howell Dec 2009

Effects On Digital Image Quality When Photographing Through A Transparent Material Used To Hold Or Flatten An Original Object, Paul E. Howell

Masters Theses

An increasing number of libraries and archives are initiating projects where new and updated technologies make it practical to digitize materials containing color and fine detail. Many of the imaging systems and methods used for this process require that some type of glass or plastic be placed over the original to hold it flat and in the correct position during image capture. The physical properties of a material placed between an original object and the capture system or camera, during digitization, could possibly affect the accuracy of image color and quality being reproduced by the system. This investigation provides an …


Research In Information Technology: Analysis Of Existing Graduate Research, Christopher John Cole Oct 2009

Research In Information Technology: Analysis Of Existing Graduate Research, Christopher John Cole

Theses and Dissertations

Information Technology is an academic discipline that is well recognized by the academic community. There is an increasing number of schools offering degrees in Information Technology and has there is an official curriculum published with the ACM/IEEE computing Curriculum. A concern with Information Technology as an academic discipline is that it does not have a clearly defined set of research issues which are not studied by any other discipline. One way to propose this set of issues is to perform a “bottom-up” analysis and gather research in IT that has already been published. This research can then be analyzed for …


Expert System Design Guide For Lower Classification Roads Over High Pi Clays, Yaqi Wanyan Jan 2008

Expert System Design Guide For Lower Classification Roads Over High Pi Clays, Yaqi Wanyan

Open Access Theses & Dissertations

This research was focused on low-volume roads over expansive clayey soils in Texas. In spite of the redundant pavement designs recommended and widely used in Texas for roads in high PI clay areas, these pavements often fail prematurely. This failure occurs primarily because of the highly variable properties of the clayey subgrade throughout the year due to moisture fluctuations. The problematic nature of high PI clays, despite the fact that volumetric changes such as heaving are sometime considered in the design, is of concern since they contribute to roughness and longitudinal shrinkage cracking of the road, and as such the …


Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast Jul 1972

Entropy Reduction Of English Text Using Variable Length Grouping, Vincent Norman Ast

Dissertations and Theses

It is known that the entropy of English text can be reduced by arranging the text into groups of two or more letters each. The higher the order of the grouping the greater is the entropy reduction. Using this principle in a computer text compressing system brings about difficulties, however, because the number of entries required in the translation table increases exponentially with group size. This experiment examined the possibility of using a translation table containing only selected entries of all group sizes with the expectation of obtaining a substantial entropy reduction with a relatively small table. An expression was …