Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan Jun 2015

Technical Communication As Teaching: A Grounded Theory Study Of Cognitive Empathy And Audience Engagement Among Computer Science Majors In A Technical Communication Classroom, Robert Michael Rowan

Theses and Dissertations

This dissertation is a grounded theory study of empathy, ethical awareness, and audience engagement activities in students in a technical writing service course. The course was designed around an empathy-oriented approach to teaching technical writing and writing research. The students are primarily computer science majors, and the teaching methods include a genre and writing research approach as well as the use of an extended metaphor of technical communication as a form of teaching. Findings indicate that students respond to the metaphor by drawing upon positive and empathetically-informed models of teachers and teaching to guide how they would work with and …


Modeling And Simulation Of Evacuation Plan For Hancock Stadium, Nirmal Neranjan Weerasekara Mar 2015

Modeling And Simulation Of Evacuation Plan For Hancock Stadium, Nirmal Neranjan Weerasekara

Theses and Dissertations

The goal of this study is to use Modeling and Simulation of Evacuation Plan (MSEP) to support management to execute proper evacuation plan in case of emergency at Hancock Stadium in Illinois State University. Analyses of the research literature and evacuation scenarios are used to build a simulation system that will connect a description of emergency and evacuation situation with its context. It shows how an evacuation plan actually functions. The results of the study will help safety managers to understand the current situations of evacuation according to the specific simulation scenarios. The evacuation simulation is categorized according to the …


Using Software Defined Networking To Solve Missed Firewall Architecture In Legacy Networks, Jared Dean Vogel Mar 2015

Using Software Defined Networking To Solve Missed Firewall Architecture In Legacy Networks, Jared Dean Vogel

Theses and Dissertations

This study is concerned with migrating traditional networks and their inherent firewall architecture to Software Defined Networking (SDN) architecture to provide an initial attempt at preventing application downtime due to hidden firewall domain rules. In legacy organization environments the networking engineers, firewall teams, and application analysts are often silo groups, but Software Defined Networking (SDN) can blur the lines between these group silos.

This thesis first outlines the interworking of SDN, traditional firewall architecture and how it interacts with SDN, an experiment of implementation, and the resulting conclusions.

Testing with SDN shows we are approaching new environments where the edges …


Unknown Threat Detection With Honeypot Ensemble Analsyis Using Big Datasecurity Architecture, Michael Eugene Sanders Mar 2015

Unknown Threat Detection With Honeypot Ensemble Analsyis Using Big Datasecurity Architecture, Michael Eugene Sanders

Theses and Dissertations

The amount of data that is being generated continues to rapidly grow in size and complexity. Frameworks such as Apache Hadoop and Apache Spark are evolving at a rapid rate as organizations are building data driven applications to gain competitive advantages. Data analytics frameworks decomposes our problems to build applications that are more than just inference and can help make predictions as well as prescriptions to problems in real time instead of batch processes.

Information Security is becoming more important to organizations as the Internet and cloud technologies become more integrated with their internal processes. The number of attacks and …


Sensitivity Analysis For The Winning Algorithm In Knowledge Discovery And Data Mining ( Kdd ) Cup Competition 2014, Fakhri Ghassan Abbas Mar 2015

Sensitivity Analysis For The Winning Algorithm In Knowledge Discovery And Data Mining ( Kdd ) Cup Competition 2014, Fakhri Ghassan Abbas

Theses and Dissertations

This thesis applies multi-way sensitivity analysis for the winning algorithm in the Knowledge Discovery in Data Mining (KDD) cup competition 2014 -`Predicting Excitement at Donors.org'. Because of the highly advanced nature of this competition, analyzing the winning solution under a variety of different conditions provides insight about each of the models the winning team has used in the competition. The study follows Cross Industry Standard Process (CRISP) for data mining to study the steps taken to prepare, model and evaluate the model. The thesis focuses on a gradient boosting model. After careful examination of the models created by the researchers …