Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, 2012 Wright State University - Main Campus
Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, William L. Romine, Tanvi Banerjee, William S. Barrow, William R. Folk
Kno.e.sis Publications
We used data from a convenience sample of 410 Midwestern United States students from six secondary schools to develop parsimonious models for explaining and predicting precautions and illness related to influenza. Scores for knowledge and perceptions were obtained using two-parameter Item Response Theory (IRT) models. Relationships between outcome variables and predictors were verified using Pearson and Spearman correlations, and nested [student within school] fixed effects multinomial logistic regression models were specified from these using Akaike’s Information Criterion (AIC). Neural network models were then formulated as classifiers using 10-fold cross validation to predict precautions and illness. Perceived barriers against taking precautions …
What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, 2012 Wright State University - Main Campus
What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, Hemant Purohit, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach
Kno.e.sis Publications
The present research aims to detect coordinated citizen response within social media traffic to assist emergency response. We use domain-independent linguistic properties as the first step in narrowing the candidate set of messages for domain-dependent and computationally intensive analysis.
A Survey Of Mobile Computing Security Issues And Possible Solutions, 2012 Governors State University
A Survey Of Mobile Computing Security Issues And Possible Solutions, Glenn Kimpell
All Capstone Projects
This project reviews security issues with mobile devices and offers possible solutions from Internet sources. (supplied by OPUS staff)
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, 2012 Wright State University - Main Campus
Iexplore: A Provenance-Based Application For Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Thomas Rindflesch, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, 2012 Wright State University - Main Campus
W3c Semantic Sensor Networks: Ontologies, Applications, And Future Directions, Cory Andrew Henson
Kno.e.sis Publications
Plenary Talk discussing the W3C Semantic Sensor Network, including the ontology, applications, and future directions.
Resource Provisioning In Large-Scale Self-Organizing Distributed Systems, 2012 Air Force Institute of Technology
Resource Provisioning In Large-Scale Self-Organizing Distributed Systems, M. Brent Reynolds
Theses and Dissertations
This dissertation researches the mathematical translation of resource provisioning policy into mathematical terms and parameters to solve the on-line service placement problem. A norm called the Provisioning Norm is introduced. Theorems presented in the work show the Provisioning Norm utility function and greedy, random, local search effectively and efficiently solve the on-line problem. Caching of placements is shown to reduce the cost of change but does not improve response time performance. The use of feedback control theory is shown to be effective at significantly improving performance but increases the cost of change. The theoretical results are verified using a decentralized, …
Prediction Of Topic Volume On Twitter, 2012 Wright State University - Main Campus
Prediction Of Topic Volume On Twitter, Yiye Ruan, Hemant Purohit, David Fuhry, Srinivasan Parthasarathy, Amit P. Sheth
Kno.e.sis Publications
We discuss an approach for predicting microscopic (individual) and macroscopic (collective) user behavioral patterns with respect to specific trending topics on Twitter. Going beyond previous efforts that have analyzed driving factors in whether and when a user will publish topic-relevant tweets, here we seek to predict the strength of content generation which allows more accurate understanding of Twitter users' behavior and more effective utilization of the online social network for diffusing information. Unlike traditional approaches, we consider multiple dimensions into one regression-based prediction framework covering network structure, user interaction, content characteristics and past activity. Experimental results on three large Twitter …
A Web-Based Study Of Self-Treatment Of Opioid Withdrawal Symptoms With Loperamide, 2012 Wright State University - Main Campus
A Web-Based Study Of Self-Treatment Of Opioid Withdrawal Symptoms With Loperamide, Raminta Daniulaityte, Robert G. Carlson, Russel S. Falck, Delroy H. Cameron, Sujan Udayanaga, Lu Chen, Amit P. Sheth
Kno.e.sis Publications
Aims: Many websites provide a medium for individuals to freely share their experiences and knowledge about different drugs. Such user-generated content can be used as a rich data source to study emerging drug use practices and trends. The study aims to examine web-based reports of loperamide use practices among non-medical opioid users. Loperamide, a piperidine derivative, is an opioid agonist approved for the control of diarrhea symptoms. Because of its general inability to cross the blood-brain barrier, it is considered to have no abuse potential and is available without a prescription. Methods: A website that allows free discussion of illicit …
Topical Anomaly Detection From Twitter Streams, 2012 Wright State University - Main Campus
Topical Anomaly Detection From Twitter Streams, Pramod Anantharam, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, 2012 California Polytechnic State University, San Luis Obispo
Cuda Web Api Remote Execution Of Cuda Kernels Using Web Services, Massimo J. Becker
Master's Theses
Massively parallel programming is an increasingly growing field with the recent introduction of general purpose GPU computing. Modern graphics processors from NVIDIA and AMD have massively parallel architectures that can be used for such applications as 3D rendering, financial analysis, physics simulations, and biomedical analysis. These massively parallel systems are exposed to programmers through in- terfaces such as NVIDIAs CUDA, OpenCL, and Microsofts C++ AMP. These frame- works expose functionality using primarily either C or C++. In order to use these massively parallel frameworks, programs being implemented must be run on machines equipped with massively parallel hardware. These requirements limit …
Self-Organizing Neural Networks For Learning Air Combat Maneuvers, 2012 Singapore Management University
Self-Organizing Neural Networks For Learning Air Combat Maneuvers, Teck-Hou Teng, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
This paper reports on an agent-oriented approach for the modeling of adaptive doctrine-equipped computer generated force (CGF) using a commercial-grade simulation platform known as CAE STRIVECGF. A self- organizing neural network is used for the adaptive CGF to learn and generalize knowledge in an online manner during the simulation. The challenge of defining the state space and action space and the lack of domain knowledge to initialize the adaptive CGF are addressed using the doctrine used to drive the non-adaptive CGF. The doctrine contains a set of specialized knowledge for conducting 1-v-1 dogfights. The hierarchical structure and symbol representation of …
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, 2012 Western Michigan University
Adaptive Security-Aware Scheduling For Packet Switched Networks Using Real-Time Multi-Agent Systems, Ma'en Saleh Saleh
Dissertations
Conventional real-time scheduling algorithms are in care of timing constraints; they don’t pay any attention to enhance or optimize the real-time packet’s security performance. In this work, we propose an adaptive security-aware scheduling with congestion control mechanism for packet switching networks using real-time agentbased systems. The proposed system combines the functionality of real-time scheduling with the security service enhancement, where the real-time scheduling unit uses the differentiated-earliest-deadline-first (Diff-EDF) scheduler, while the security service enhancement scheme adopts a congestion control mechanism based on a resource estimation methodology.
The security service enhancement unit was designed based on two models: singlelayer and weighted …
Integrating Owl And Rules: A Syntax Proposal For Nominal Schemas, 2012 Wright State University - Main Campus
Integrating Owl And Rules: A Syntax Proposal For Nominal Schemas, David Carral Martinez, Adila Krisnadhi, Pascal Hitzler
Computer Science and Engineering Faculty Publications
This paper proposes an addition to OWL 2 syntax to incorporate nominal schemas, which is a new description-logic style extension of OWL 2 which was recently proposed, and which makes is possible to express "variable nominal classes" within axioms in an OWL 2 ontology. Nominal schemas make it possible to express DL-safe rules of arbitrary arity within the extended OWL paradigm, hence covering the well-known DL-safe SWRL language. To express this feature, we extend OWL 2 syntax to include necessary and minimal modifications to both Functional and Manchester syntax grammars and mappings from these two syntaxes to Turtle/RDF. We also …
Semantic Aspects Of Earthcube, 2012 Wright State University - Main Campus
Semantic Aspects Of Earthcube, Pascal Hitzler, Krzysztof Janowicz, Gary Berg-Cross, Leo Obrst, Amit P. Sheth, Timothy Finin, Isabel F. Cruz
Kno.e.sis Publications
In this document, we give a high-level overview of selected Semantic (Web) technologies, methods, and other important considerations, that are relevant for the success of EarthCube. The goal of this initial document is to provide entry points and references for discussions between the Semantic Technologies experts and the domain experts within EarthCube. The selected topics are intended to ground the EarthCube roadmap in the state of the art in semantics research and ontology engineering.
We anticipate that this document will evolve as EarthCube progresses. Indeed, all EarthCube parties are asked to provide topics of importance that should be treated in …
Trust Networks, 2012 Wright State University - Main Campus
Trust Networks, Krishnaprasad Thirunarayan, Pramod Anantharam, Cory Andrew Henson, Amit P. Sheth
Kno.e.sis Publications
Trust relationships occur naturally in many diverse contexts such as collaborative systems, e-commerce, interpersonal interactions, social networks, semantic sensor web, etc. As collaborating agents providing content and services become increasingly removed from the agents that consume them, the issue of robust trust inference and update become critical. There is a need to find online substitutes for traditional (direct or face-to-face) cues to derive measures of trust, and create efficient and secure system for managing trust, to support decision-making. Unfortunately, there is neither a universal notion of trust that is applicable to all domains nor a clear explication of its semantics …
Perceptions Measurement Of Professional Certifications To Augment Buffalo State College Baccalaureate Technology Programs, As A Representative American Postsecondary Educational Institution, 2012 Buffalo State College
Perceptions Measurement Of Professional Certifications To Augment Buffalo State College Baccalaureate Technology Programs, As A Representative American Postsecondary Educational Institution, Christopher N. Brown
Industrial Technology Theses
The purpose of this study was to assess, measure, and analyze whether voluntary, nationally-recognized professional certification credentials were important to augment technology programs at Buffalo State College (BSC), as a representative postsecondary baccalaureate degree-granting institution offering technology curricula. Six BSC undergraduate technology programs were evaluated within the scope of this study: 1.) Computer Information Systems; 2.) Electrical Engineering, Electronics; 3.) Electrical Engineering, Smart Grid; 4.) Industrial Technology; 5.) Mechanical Engineering; and 6.) Technology Education. This study considered the following three aspects of the problem: a.) postsecondary technology program enrollment and graduation trends; b.) the value/awareness of professional certifications to employers …
Extending Description Logic Rules, 2012 Wright State University - Main Campus
Extending Description Logic Rules, David Carral Martinez, Pascal Hitzler
Computer Science and Engineering Faculty Publications
Description Logics – the logics underpinning the Web Ontology Language OWL – and rules are currently the most prominent paradigms used for modeling knowledge for the Semantic Web. While both of these approaches are based on classical logic, the paradigms also differ significantly, so that naive combinations result in undesirable properties such as undecidability. Recent work has shown that many rules can in fact be expressed in OWL. In this paper we extend this work to include some types of rules previously excluded. We formally define a set of first order logic rules, C-Rules, which can be expressed within OWL …
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, 2012 University of Nebraska-Lincoln
A Multi-Modal Sensing And Communication Platform For Continental-Scale Migratory Bird Tracking, David J. Anthony
Computer and Electronics Engineering: Dissertations, Theses, and Student Research
This thesis presents a novel platform for tracking migratory birds on a continental scale. Cellular technology is used to augment the short-range radios that have traditionally been used in wireless sensor networks. The platform utilizes multiple sensors, including a GPS and solid state compass. By using these sensors, the platform is capable of not only tracking a bird’s migration path, but also provides information on a bird’s behavior during its life-cycle. Testing methodology utilizing simulations and aspect-oriented programming is used to reveal faults in the platform prior to deployment on wild animals. In collaboration with the International Crane Foundation, and …
Strategyproof Mechanisms For Ad Hoc Network Formation, 2012 Singapore Management University
Strategyproof Mechanisms For Ad Hoc Network Formation, C. Jason Woodard, David C. Parkes
C. Jason Woodard
Agents in a peer-to-peer system typically have incentives to influence its network structure, either to reduce their costs or increase their ability to capture value. The problem is compounded when agents can join and leave the system dynamically. This paper proposes three economic mechanisms that offset the incentives for strategic behavior and facilitate the formation of networks with desirable global properties.
Check Image Processing: Webp Conversion And Micr Scan Android Application, 2012 California Polytechnic State University - San Luis Obispo
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …