Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Library and Information Science

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Decentering The Writing Program Archive: How Composition Instructors Save And Share Their Teaching Materials, Stacy Olivia Nall Aug 2016

Decentering The Writing Program Archive: How Composition Instructors Save And Share Their Teaching Materials, Stacy Olivia Nall

Open Access Dissertations

This dissertation decenters the writing program archive through research on instructors’ digital archives. Artifacts of composition instruction are no longer saved to print archives alone; rather, digital technologies expand the locations where artifacts of writing pedagogy can be archived and accessed. The following archival ethnography, focused on a community engagement writing course in the Introductory Composition at Purdue (ICaP) program, finds that many digital archives of composition are hidden to outside researchers or not sustained (which are theorized as either “abandoned” or “pop-up” archives). At the same time, some pedagogical materials are publicly visible by virtue of personal web spaces …


Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins Aug 2016

Organizing Historical Agricultural Data And Identifying Data Integrity Zones To Assess Agricultural Data Quality, Elizabeth Marie Hawkins

Open Access Dissertations

As precision agriculture transitions into decision agriculture, data driven decision- making has become the focus of the industry and data quality will be increasingly important. Traditionally, yield data cleaning techniques have removed individual data points based on criteria primarily focused on the yield values. However, when these methods are used, the underlying causes of the errors are often overlooked and as a result, these techniques may fail to remove all of the inaccurate data or remove “good” data. As part of this research, an alternative to data cleaning was developed. Data integrity zones (DIZ) within each field were identified by …


An Analysis Of The Current Strength Of The Academic Relationship With The Aerospace Industry, James A. Stratton Aug 2016

An Analysis Of The Current Strength Of The Academic Relationship With The Aerospace Industry, James A. Stratton

Open Access Dissertations

The objective of this research was to discover which methods of technology transfer were most commonly accessed within the Indiana manufacturing sector in an effort to best serve companies in the Hoosier State. Previous work has explored the perceived importance of various academic sources, but there has not been an investigation to identify the specific preferences of industry professionals. If these preferences can be identified, university assistance programs and other academic engagement programs will be able to predict, and hopefully influence how to grow and develop the domestic manufacturing sector, ultimately strengthening the channels of knowledge transfer between academia and …


A Black Art: Ontology, Data, And The Tower Of Babel Problem, Andrew J. Iliadis Apr 2016

A Black Art: Ontology, Data, And The Tower Of Babel Problem, Andrew J. Iliadis

Open Access Dissertations

Computational ontologies are a new type of emerging scientific media (Smith, 2016) that process large quantities of heterogeneous data about portions of reality. Applied computational ontologies are used for semantically integrating (Heiler, 1995; Pileggi & Fernandez-Llatas, 2012) divergent data to represent reality and in so doing applied computational ontologies alter conceptions of materiality and produce new realities based on levels of informational granularity and abstraction (Floridi, 2011), resulting in a new type of informational ontology (Iliadis, 2013) the critical analysis of which requires new methods and frameworks. Currently, there is a lack of literature addressing the theoretical, social, and critical …


Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett Apr 2015

Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett

Open Access Theses

The security that passwords provide could be seriously flawed due to the way people cope with having to memorize and recall their passwords. The National Institute of Standards and Technology (NIST) standard that is used to measure the password strength, known as entropy, is designed for a single use and does not consider that users may choose to keep parts of their password across password changes. This study shows that a portion of users keep some information from previous passwords across changes. These habits which will be called coping mechanisms that over time serve to erode the protection provided by …


A Cross-Site Study Of User Behavior And Privacy Perception In Social Networks, Yue Zhang Jul 2014

A Cross-Site Study Of User Behavior And Privacy Perception In Social Networks, Yue Zhang

Open Access Theses

While online social networking sites have brought convenience and diversity in people's social lives, they have also been the source for information leakage. Researchers have been looking for ways to balance user privacy protection and information disclosure. However, literature suggested that many users either failed to perceive privacy risks correctly or they failed to behave in accordance with privacy awareness even they have already perceived potential risks. ^ This thesis conducted a survey to measure social network users' privacy attitude, privacy perception and their actual behavior when using social networking sites. The survey targeted at three populations of different cultural …


Culture-Based Interpretation Of Projected Destination Images: A Semantic Network Analysis, Menglu Gao Apr 2014

Culture-Based Interpretation Of Projected Destination Images: A Semantic Network Analysis, Menglu Gao

Open Access Theses

This study attempts to explore destination image interpretation in the context of two cultural groups (US and China) and two information sources (Blog and Destination Management Organization website). Semantic Network Analysis was employed to obtain a visual representation and comparison of perceived destination image categories of Marrakesh across groups. Computer-Aided Textual Analysis software, AutoMap3.0 Program and ROST Content Mining System, were used initially for data preparation and keywords analysis, and UCINET 6 was then applied to conduct semantic network analysis such as centrality analysis and network structure measurements. The results indicated that the perceived image of Marrakesh varies by the …


Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge Oct 2013

Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge

Open Access Dissertations

The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.

There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …