Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

788 Full-Text Articles 845 Authors 437954 Downloads 75 Institutions

All Articles in Other Computer Sciences

Faceted Search

788 full-text articles. Page 1 of 30.

Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs 2016 University of Dayton

Volume And Cost Implications Of Product Portfolio Complexity, Mark A. Jacobs

Mark Jacobs

Business leaders are concerned about the impacts of increasing levels of product portfolio complexity since many sense that complexity related costs such as order management, procurement, and inventory threaten to undermine operational efficiencies and consume profits. Even so, managers do not fully understand the extent and breadth of the impacts of product portfolio complexity. A more complete understanding of the operational effects of product portfolio complexity is lacking partially because researchers have not yet offered a robust theoretical perspective or studied it in a focused controlled way; until now. Herein, measures of product portfolio complexity are developed and related to ...


Molecular Distance Maps: An Alignment-Free Computational Tool For Analyzing And Visualizing Dna Sequences' Interrelationships, Rallis Karamichalis 2016 The University of Western Ontario

Molecular Distance Maps: An Alignment-Free Computational Tool For Analyzing And Visualizing Dna Sequences' Interrelationships, Rallis Karamichalis

Electronic Thesis and Dissertation Repository

In an attempt to identify and classify species based on genetic evidence, we propose a novel combination of methods to quantify and visualize the interrelationships between thousand of species. This is possible by using Chaos Game Representation (CGR) of DNA sequences to compute genomic signatures which we then compare by computing pairwise distances. In the last step, the original DNA sequences are embedded in a high dimensional space using Multi-Dimensional Scaling (MDS) before everything is projected on a Euclidean 3D space.

To start with, we apply this method to a mitochondrial DNA dataset from NCBI containing over 3,000 species ...


A Data Fusion Approach To Automated Decision Making In Intelligent Vehicles, Besat Zardosht 2016 The University of Western Ontario

A Data Fusion Approach To Automated Decision Making In Intelligent Vehicles, Besat Zardosht

Electronic Thesis and Dissertation Repository

The goal of an intelligent transportation system is to increase safety, convenience and efficiency in driving. Besides these obvious advantages, the integration of intelligent features and autonomous functionalities on vehicles will lead to major economic benefits from reduced fuel consumption to efficient exploitation of the road network.

While giving this information to the driver can be useful, there is also the possibility of overloading the driver with too much information. Existing vehicles already have some mechanisms to take certain actions if the driver fails to act. Future vehicles will need more complex decision making modules which receive the raw data ...


Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro 2016 The University of Western Ontario

Agora: A Knowledge Marketplace For Machine Learning, Mauro Ribeiro

Electronic Thesis and Dissertation Repository

More and more data are becoming part of people's lives. With the popularization of technologies like sensors, and the Internet of Things, data gathering is becoming possible and accessible for users. With these data in hand, users should be able to extract insights from them, and they want results as soon as possible. Average users have little or no experience in data analytics and machine learning and are not great observers who can collect enough data to build their own machine learning models. With large quantities of similar data being generated around the world and many machine learning models ...


Using Physical And Social Sensors In Real-Time Data Streaming For Natural Hazard Monitoring And Response, Yelena Kropivnitskaya 2016 The University of Western Ontario

Using Physical And Social Sensors In Real-Time Data Streaming For Natural Hazard Monitoring And Response, Yelena Kropivnitskaya

Electronic Thesis and Dissertation Repository

Technological breakthroughs in computing over the last few decades have resulted in important advances in natural hazards analysis. In particular, integration of a wide variety of information sources, including observations from spatially-referenced physical sensors and new social media sources, enables better estimates of real-time hazard. The main goal of this work is to utilize innovative streaming algorithms for improved real-time seismic hazard analysis by integrating different data sources and processing tools into cloud applications. In streaming algorithms, a sequence of items from physical and social sensors can be processed in as little as one pass with no need to store ...


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. McFarlin, Paul B. Sweeney 2016 University of Dayton

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Paul B. Sweeney

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development.

The data showed that the CIOs who ...


Paper-Android-Based Health Care Management System, Fazal Masud Kundi, Anam Habib, ammara habib, Dr. Muhammad Zubair Asghar 2016 Gomal University, Dera Ismail Khan

Paper-Android-Based Health Care Management System, Fazal Masud Kundi, Anam Habib, Ammara Habib, Dr. Muhammad Zubair Asghar

Dr. Muhammad Zubair Asghar

The primary goal of this study is to develop an android-based healthcare application, which can assist the
users to monitor their health-related conditions for improving their health. Methods: The application is developed using android operating system environment. A Visual block programming language, namely MIT App Inventor is used to develop the system. The modification is presented as: (1) integration of different modules and their ffline usage, (2) history facility, (3) user friendly. The qualitative method is used to study the objective. Findings: The research paper depicts a brief study of existing systems and the new development that has made in ...


Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman 2016 University of Dayton

Integrating Strategic And Tactical Rolling Stock Models With Cyclical Demand, Michael F. Gorman

Michael F. Gorman

In the transportation industry, companies position rolling stock where it is likely to be needed in the face of a pronounced weekly cyclical demand pattern in orders.

Strategic policies based on assumptions of repetition of cyclical weekly patterns set rolling stock targets; during tactical execution, a myriad dynamic influences cause deviations from strategically set targets. We find that optimal strategic plans do not agree with results of tactical modeling; strategic results are in fact suboptimal in many tactical situations. We discuss managerial implications of this finding and how the two modeling paradigms can be reconciled.


Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman 2016 University of Dayton

Pricing And Product Mix Optimization In Freight Transportation, Michael F. Gorman

Michael F. Gorman

We propose improved pricing and market mix can improve the profitability of the freight transportation provider through the reduction of equipment repositioning costs. We hypothesize that because of complexities surrounding pricing and equipment repositioning costing, existing pricing strategies in freight transportation fail to fully consider these costs. We test this hypothesis in an applied setting in which Monte Carlo simulation captures the stochasticity of market conditions inherent in the problem. We use a heuristic to improve the nondifferentiable, discontinuous objective function.

Our results from test cases show with high confidence that current prices are not optimal, as indicated by a ...


How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. McFarlin, Paul B. Sweeney 2016 University of Dayton

How Cios Overcome The Competing Values Challenge: Irish Cios’ Perspectives, Harvey Enns, Dean B. Mcfarlin, Paul B. Sweeney

Harvey Enns

Competing values are a fact of organizational life. However, there are gaps in our understanding about how these opposing beliefs hinder influence processes. This article draws on interview data to demonstrate how Irish Chief Information Officers (CIOs) are able to convince their colleagues to support new projects within their firms in the face of competing values. Focused interviews were used to explore the influence process and the competing values phenomenon, since this type of research is at an early stage and qualitative methods and analysis serve as a rich source of theory development.

The data showed that the CIOs who ...


Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. McDonagh 2016 University of Dayton

Irish Cios’ Influence On Technology Innovation And It-Business Alignment, Harvey Enns, Joseph J. Mcdonagh

Harvey Enns

Technology is the driving force behind many of today’s new products, services, and cost-cutting measures. However, there are gaps in our understanding about how technological innovation is fostered and nurtured in organizations. Part of the answer is to examine how Chief Information Officers (CIOs) exercise influence regarding technological innovation in organizations. This is particularly important since the CIO is the head of technology in organizations, an important source of technological innovation. This article draws on an established executive influence framework to demonstrate how Irish CIOs are able to solidify Information Technology’s (IT’s) contribution to technological innovation via ...


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns 2016 University of Dayton

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Harvey Enns

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating ...


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn 2016 University of Dayton

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

William D Salisbury PhD

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is ...


Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns 2016 University of Dayton

Synergy And Its Limits In Managing Information Technology Professionals, Thomas W. Ferratt, Jayesh Prasad, Harvey Enns

Thomas Ferratt

We examine the effects of human resource management (HRM) practices (e.g., career development, social support, compensation, and security) on IT professionals‟ job search behavior. Job search is a relatively novel dependent variable in studies of voluntary withdrawal behavior, in general, and for IT professionals, in particular. From a universalistic perspective, HRM practices individually and in combination exhibit independently additive effects on job search behavior. Our study contrasts this perspective with configurational theory, hypothesizing that proposed idealtype configurations of HRM practices have synergistic effects on job search behavior. We contribute to the IT and broader HRM literature by theoretically explicating ...


Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn 2016 University of Dayton

Assessing The Emphasis On Information Security In The Systems Analysis And Design Course, William David Salisbury, Thomas W. Ferratt, Donald E. Wynn

Thomas Ferratt

Due to several recent highly publicized information breaches, information security has gained a higher profile. Hence, it is reasonable to expect that information security would receive an equally significant emphasis in the education of future systems professionals. A variety of security standards that various entities (e.g., NIST, COSO, ISACA-COBIT, ISO) have put forth emphasize the importance of information security from the very beginning of the system development lifecycle (SDLC) to avoid significant redesign in later phases. To determine the emphasis on security in typical systems analysis and design (SA&D) courses, we examine (1) to what extent security is ...


Feature Extraction To Improve Nowcasting Using Social Media Event Detection On Cloud Computing And Sentiment Analysis, David L. Kimmey 2016 Indiana University - Purdue University Fort Wayne

Feature Extraction To Improve Nowcasting Using Social Media Event Detection On Cloud Computing And Sentiment Analysis, David L. Kimmey

Masters' Theses

Nowcasting is defined as the prediction of the present, the very near future, and the very recent past using real-time data. Nowcasting with social media creates challenges because of the HACE characteristics of big data (i.e., heterogeneous, autonomous, complex, and evolving associations). Thus, this thesis proposes a feature extraction method to improve nowcasting with social media. The proposed social media event detection algorithm utilizes K-SPRE methodology and the results are processed with sentiment analysis. In addition, we develop a parallel algorithm of the methodology on a cloud environment, and we adapt an artificial neural network to build a predictive ...


Quantitative Metrics For Comparison Of Hyper-Dimensional Lsa Spaces For Semantic Differences, John Christopher Martin 2016 University of Tennessee, Knoxville

Quantitative Metrics For Comparison Of Hyper-Dimensional Lsa Spaces For Semantic Differences, John Christopher Martin

Doctoral Dissertations

Latent Semantic Analysis (LSA) is a mathematically based machine learning technology that has demonstrated success in numerous applications in text analytics and natural language processing. The construction of a large hyper-dimensional space, a LSA space, is central to the functioning of this technique, serving to define the relationships between the information items being processed. This hyper-dimensional space serves as a semantic mapping system that represents learned meaning derived from the input content. The meaning represented in an LSA space, and therefore the mappings that are generated and the quality of the results obtained from using the space, is completely dependent ...


Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj 2016 Kennesaw State University

Color Image Segmentation Using The Bee Algorithm In The Markovian Framework, Vehbi Dragaj

Master of Science in Computer Science Theses

This thesis presents color image segmentation as a vital step of image analysis in computer vision. A survey of the Markov Random Field (MRF) with four different implementation methods for its parameter estimation is provided. In addition, a survey of swarm intelligence and a number of swarm based algorithms are presented. The MRF model is used for color image segmentation in the framework. This thesis introduces a new image segmentation implementation that uses the bee algorithm as an optimization tool in the Markovian framework. The experiments show that the new proposed method performs faster than the existing implementation methods with ...


Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline 2016 California State University, Sacramento

Automated Detection Of Deep-Sea Animals, Dallas J. Hollis, Duane Edgington, Danelle Cline

STAR (STEM Teacher and Researcher) Program Posters

The Monterey Bay Aquarium Research Institute routinely deploys remotely operated underwater vehicles equipped with high definition cameras for use in scientific studies. Utilizing a video collection of over 22,000 hours and the Video Annotation and Reference System, we have set out to automate the detection and classification of deep-sea animals. This paper serves to explore the pitfalls of automation and suggest possible solutions to automated detection in diverse ecosystems with varying field conditions. Detection was tested using a saliency-based neuromorphic selective attention algorithm. The animals that were not detected were then used to tune saliency parameters. Once objects are ...


Whisk: Web Hosted Information Into Summarized Knowledge, Jiewen Wu 2016 California Polytechnic State University, San Luis Obispo

Whisk: Web Hosted Information Into Summarized Knowledge, Jiewen Wu

Master's Theses and Project Reports

Today’s online content increases at an alarmingly rate which exceeds users’ ability to consume such content. Modern search techniques allow users to enter keyword queries to find content they wish to see. However, such techniques break down when users freely browse the internet without knowing exactly what they want. Users may have to invest an unnecessarily long time reading content to see if they are interested in it. Automatic text summarization helps relieve this problem by creating synopses that significantly reduce the text while preserving the key points. Steffen Lyngbaek created the SPORK summarization pipeline to solve the content ...


Digital Commons powered by bepress