Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Non-Invasive Clinical Parameters For The Prediction Of Urodynamic Bladder Outlet Obstruction: Analysis Using Causal Bayesian Networks, Myong Kim, Abhilash Cheeti, Changwon Yoo, Minsoo Choo, Jae-Seung Paick, Seung-June Oh Nov 2014

Non-Invasive Clinical Parameters For The Prediction Of Urodynamic Bladder Outlet Obstruction: Analysis Using Causal Bayesian Networks, Myong Kim, Abhilash Cheeti, Changwon Yoo, Minsoo Choo, Jae-Seung Paick, Seung-June Oh

School of Computing and Information Sciences

Purpose: To identify non-invasive clinical parameters to predict urodynamic bladder outlet obstruction (BOO) in patients with benign prostatic hyperplasia (BPH) using causal Bayesian networks (CBN). Subjects and Methods: From October 2004 to August 2013, 1,381 eligible BPH patients with complete data were selected for analysis. The following clinical variables were considered: age, total prostate volume (TPV), transition zone volume (TZV), prostate specific antigen (PSA), maximum flow rate (Qmax), and post-void residual volume (PVR) on uroflowmetry, and International Prostate Symptom Score (IPSS). Among these variables, the independent predictors of BOO were selected using the CBN model. The predictive performance of the …


Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci Nov 2014

Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci

FIU Electronic Theses and Dissertations

Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …


3d Navigation With Six Degrees-Of-Freedom Using A Multi-Touch Display, Francisco Raul Ortega Nov 2014

3d Navigation With Six Degrees-Of-Freedom Using A Multi-Touch Display, Francisco Raul Ortega

FIU Electronic Theses and Dissertations

With the introduction of new input devices, such as multi-touch surface displays, the Nintendo WiiMote, the Microsoft Kinect, and the Leap Motion sensor, among others, the field of Human-Computer Interaction (HCI) finds itself at an important crossroads that requires solving new challenges. Given the amount of three-dimensional (3D) data available today, 3D navigation plays an important role in 3D User Interfaces (3DUI). This dissertation deals with multi-touch, 3D navigation, and how users can explore 3D virtual worlds using a multi-touch, non-stereo, desktop display.

The contributions of this dissertation include a feature-extraction algorithm for multi-touch displays (FETOUCH), a multi-touch and gyroscope …


Text Analytics Of Social Media: Sentiment Analysis, Event Detection And Summarization, Chao Shen Oct 2014

Text Analytics Of Social Media: Sentiment Analysis, Event Detection And Summarization, Chao Shen

FIU Electronic Theses and Dissertations

In the last decade, large numbers of social media services have emerged and been widely used in people's daily life as important information sharing and acquisition tools. With a substantial amount of user-contributed text data on social media, it becomes a necessity to develop methods and tools for text analysis for this emerging data, in order to better utilize it to deliver meaningful information to users.

Previous work on text analytics in last several decades is mainly focused on traditional types of text like emails, news and academic literatures, and several critical issues to text data on social media have …


Development Of A Methodology That Couples Satellite Remote Sensing Measurements To Spatial-Temporal Distribution Of Soil Moisture In The Vadose Zone Of The Everglades National Park, Luis G. Perez Aug 2014

Development Of A Methodology That Couples Satellite Remote Sensing Measurements To Spatial-Temporal Distribution Of Soil Moisture In The Vadose Zone Of The Everglades National Park, Luis G. Perez

FIU Electronic Theses and Dissertations

Spatial-temporal distribution of soil moisture in the vadose zone is an important aspect of the hydrological cycle that plays a fundamental role in water resources management, including modeling of water flow and mass transport. The vadose zone is a critical transfer and storage compartment, which controls the partitioning of energy and mass linked to surface runoff, evapotranspiration and infiltration. This dissertation focuses on integrating hydraulic characterization methods with remote sensing technologies to estimate the soil moisture distribution by modeling the spatial coverage of soil moisture in the horizontal and vertical dimensions with high temporal resolution.

The methodology consists of using …


Integrity-Based Kernel Malware Detection, Feng Zhu Jun 2014

Integrity-Based Kernel Malware Detection, Feng Zhu

FIU Electronic Theses and Dissertations

Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware.

We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: …


Two-Bit Pattern Analysis For Quantitative Information Flow, Ziyuan Meng Mar 2014

Two-Bit Pattern Analysis For Quantitative Information Flow, Ziyuan Meng

FIU Electronic Theses and Dissertations

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively “small” enough to be …


Foundations Of Quantitative Information Flow: Channels, Cascades, And The Information Order, Barbara Espinoza Becerra Mar 2014

Foundations Of Quantitative Information Flow: Channels, Cascades, And The Information Order, Barbara Espinoza Becerra

FIU Electronic Theses and Dissertations

Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel.

This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as …


Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan Mar 2014

Real-Time Scheduling Of Embedded Applications On Multi-Core Platforms, Ming Fan

FIU Electronic Theses and Dissertations

For the past several decades, we have experienced the tremendous growth, in both scale and scope, of real-time embedded systems, thanks largely to the advances in IC technology. However, the traditional approach to get performance boost by increasing CPU frequency has been a way of past. Researchers from both industry and academia are turning their focus to multi-core architectures for continuous improvement of computing performance. In our research, we seek to develop efficient scheduling algorithms and analysis methods in the design of real-time embedded systems on multi-core platforms. Real-time systems are the ones with the response time as critical as …


Background Traffic Modeling For Large-Scale Network Simulation, Ting Li Feb 2014

Background Traffic Modeling For Large-Scale Network Simulation, Ting Li

FIU Electronic Theses and Dissertations

Network simulation is an indispensable tool for studying Internet-scale networks due to the heterogeneous structure, immense size and changing properties. It is crucial for network simulators to generate representative traffic, which is necessary for effectively evaluating next-generation network protocols and applications. With network simulation, we can make a distinction between foreground traffic, which is generated by the target applications the researchers intend to study and therefore must be simulated with high fidelity, and background traffic, which represents the network traffic that is generated by other applications and does not require significant accuracy. The background traffic has a significant impact on …