Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine learning (3)
- Natural Language Processing (3)
- Conditional Random Fields (2)
- End-to-end encryption (2)
- Human-Robot Interaction (2)
-
- Information Technology (2)
- OCR (2)
- Secure email (2)
- Taxonomy (2)
- Text Mining (2)
- Usable security (2)
- API Usage (1)
- Access control (1)
- Active directory (1)
- Active learning (1)
- Adapted Wicken's Model (1)
- Adjustable Autonomy (1)
- Adverse Drug Event Detection (1)
- Affective Image Annotation (1)
- Algorithm (1)
- Android (1)
- Apple (1)
- Application (1)
- Application sharing (1)
- Archives (1)
- Artificial Intelligence (1)
- Artificial Neural Networks (1)
- Augmented reality (1)
- Authentication (1)
- Authorization (1)
Articles 1 - 30 of 66
Full-Text Articles in Physical Sciences and Mathematics
A Markov Model For Baseball With Applications, Daniel Joseph Ursin
A Markov Model For Baseball With Applications, Daniel Joseph Ursin
Theses and Dissertations
In this work we confirm a Markov chain model of baseball for 2013 Major League Baseball batting data. We describe the transition matrices for individual player data and their use in generating single and nine-inning run distributions for a given lineup. The run distribution is used to calculate the expected number of runs produced by a lineup over nine innings. We discuss batting order optimization heuristics to avoid computation of distributions for the 9! = 362, 880 distinct lineups for 9 players. Finally, we describe an implementation of the algorithms and review their performance against actual game data.
Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman
Use Of Secure Messaging By United States Veterans And Significant Others, Claudia S. Derman
Theses and Dissertations
ABSTRACT
USE OF SECURE MESSAGING BY UNITED STATES VETERANS AND SIGNIFICANT OTHERS
By
Claudia S. Derman
The University of Wisconsin-Milwaukee, 2014
Under the Supervision of Professor Karen H. Morin, PhD, RN, ANEF, FAAN
The purpose of this study was to describe the topics discussed using secure messaging (SM), the pattern of use of SM, and whether the themes discussed and/or the pattern of use varied based on gender and age of the SM user. Secure messaging is an example of a technology that focuses on patient-centered communication. Secure messaging allows patients to communicate with their clinicians using the Internet and …
Api Usage Verification Through Dataflow Analysis, Kenneth Baptiste Tapsoba
Api Usage Verification Through Dataflow Analysis, Kenneth Baptiste Tapsoba
Theses and Dissertations
Using APIs in a program is often difficult because of the incomplete documentation and the shortage of available examples. To cope with that, we have seen the increase of API checking tools that provide efficient suggestions for API usage. However, most of those checking tools use a pattern-based analysis to determine errors such as misuse of API calls. In this thesis, we introduce a different analysis technique that relies on explicit API state transitions for the analysis of the program. We adopt a static dataflow analysis framework from SOOT to inspect state transitions at each program point.
Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton
Mind & Matter: The Discursive Construction Of The Iphone In Apple's Advertising, Nicholas Stratton
Theses and Dissertations
The widespread adoption of smartphone technology in the contemporary United States requires critical reflection on its role within society. This thesis compares the way Apple's television advertising discourse, from 2007 to 2011, frames the iPhone to consumers with the way Apple's iAd promotional material frames the iPhone to advertisers, and considers what the disparity between these two frameworks says about the still-evolving role of smartphone technology in society. It argues that the disparity between these two frameworks is indicative of a fundamental tension within smartphone technology. This tension is reflected in Apple's ability to discursively construct the iPhone as a …
Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng
Three Essays On Opinion Mining Of Social Media Texts, Shuyuan Deng
Theses and Dissertations
This dissertation research is a collection of three essays on opinion mining of social media texts. I explore different theoretical and methodological perspectives in this inquiry. The first essay focuses on improving lexicon-based sentiment classification. I propose a method to automatically generate a sentiment lexicon that incorporates knowledge from both the language domain and the content domain. This method learns word associations from a large unannotated corpus. These associations are used to identify new sentiment words. Using a Twitter data set containing 743,069 tweets related to the stock market, I show that the sentiment lexicons generated using the proposed method …
Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman
Text Mining Of Patient Demographics And Diagnoses From Psychiatric Assessments, Eric James Klosterman
Theses and Dissertations
Automatic extraction of patient demographics and psychiatric diagnoses from clinical notes allows for the collection of patient data on a large scale. This data could be used for a variety of research purposes including outcomes studies or developing clinical trials. However, current research has not yet discussed the automatic extraction of demographics and psychiatric diagnoses in detail. The aim of this study is to apply text mining to extract patient demographics - age, gender, marital status, education level, and admission diagnoses from the psychiatric assessments at a mental health hospital and also assign codes to each category. Gender is coded …
The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price
The Bioluminescence Heterozygous Genome Assembler, Jared Calvin Price
Theses and Dissertations
High-throughput DNA sequencing technologies are currently revolutionizing the fields of biology and medicine by elucidating the structure and function of the components of life. Modern DNA sequencing machines typically produce relatively short reads of DNA which are then assembled by software in an attempt to produce a representation of the entire genome. Due to the complex structure of all but the smallest genomes, especially the abundant presence of exact or almost exact repeats, all genome assemblers introduce errors into the final sequence and output a relatively large set of contigs instead of full-length chromosomes (a contig is a DNA sequence …
Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein
Replication And Knowledge Production In Empirical Software Engineering Research, Jonathan L. Krein
Theses and Dissertations
Although replication is considered an indispensable part of the scientific method in software engineering, few replication studies are published each year. The rate of replication, however, is not surprising given that replication theory in software engineering is immature. Not only are replication taxonomies varied and difficult to reconcile, but opinions on the role of replication contradict. In general, we have no clear sense of how to build knowledge via replication, particularly given the practical realities of our research field. Consequently, most replications in software engineering yield little useful information. In particular, the vast majority of external replications (i.e., replications performed …
Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah
Framework To Implement Authentication, Authorization And Secure Communications In A Multiuser Collaborative Cax Environment, Francis Mensah
Theses and Dissertations
Computer Aided Design (CAD) applications have historically been based on a single user per application architecture. Although this architecture is still popular to date, it does have several drawbacks. First of all the single user CAD architecture inhibits a concurrent engineering design process where several designers can work on the same model simultaneously. This limitation introduces time inefficiency especially when a project involves geographically dispersed designers. A solution to these drawbacks could be a transition from the traditional single user CAD architecture to a multiuser collaborative architecture. Advances in computer networking technologies, especially relating to the Internet, have provided the …
Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller
Classifying And Cataloging Cyber-Security Incidents Within Cyber-Physical Systems, William B. Miller
Theses and Dissertations
In the past, there were perceived delineations between the cyber world and the physical world. We are becoming increasingly aware of the overlap between these two worlds, and the overlap itself is increasing. The overlap between these two worlds is known as cyber-physical systems. There have been several incidents involving cyber-physical systems and the number of these incidents is increasing dramatically. In the past there has been no effort to identify methods for describing these incidents in the unique context of cyber-physical systems. This research provides a taxonomy for classifying these incidents that focuses on cross domain, impact oriented analysis. …
Using Random Forest In The Field Of Metabolomics, Curtis White
Using Random Forest In The Field Of Metabolomics, Curtis White
Theses and Dissertations
Metabolomics is the science of comprehensive evaluation of changes in the metabolome with a goal to elucidate underlying biological mechanisms of a living system. There is an opinion in the field of metabolomics, the study of the set of metabolites present within an organism, cell, or tissue, that the future development of the field is contingent upon two factors. One of the factors is the advancement of analytical instrumentation, and the other is developing data mining methodologies for extracting meaningful and interpretable experimental results. There are many different types of data mining methodologies, but the undertaking of selecting a particular …
A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery
A Privacy Risk Scoring Framework For Mobile, Jedidiah Spencer Montgomery
Theses and Dissertations
Protecting personal privacy has become an increasingly important issue as computers become a more integral part of everyday life. As people begin to trust more personal information to be contained in computers they will question if that information is safe from unwanted intrusion and access. With the rise of mobile devices (e.g., smartphones, tablets, wearable technology) users have enjoyed the convenience and availability of stored personal information in mobile devices, both in the operating system and within applications.For a mobile application to function correctly it needs permission or privileges to access and control various resources and controls on the mobile …
Using Variations Of Shape And Appearance In Alignment Methods For Classifying Human Actions, Sultan Mohammad Almotairi
Using Variations Of Shape And Appearance In Alignment Methods For Classifying Human Actions, Sultan Mohammad Almotairi
Theses and Dissertations
In this dissertation, we address the problem of recognizing human-action from videos. The recognition aims at recovering action information from the image sequences using different features such as variations of the human shape. Approaches based on such features often use sequence-alignment methods. We propose two novel methods for human-action recognition. We also propose an elliptical-shaped band for the Dynamic Time Warping (DTW) that provides a good compromise between alignment accuracy and computational speed. First, we study the applicability of the pairwise shape-similarity measurements for human-action recognition. Since action can be seen as a sequence of shapes of silhouette poses, there …
Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer
Scalable Detection And Extraction Of Data In Lists In Ocred Text For Ontology Population Using Semi-Supervised And Unsupervised Active Wrapper Induction, Thomas L. Packer
Theses and Dissertations
Lists of records in machine-printed documents contain much useful information. As one example, the thousands of family history books scanned, OCRed, and placed on-line by FamilySearch.org probably contain hundreds of millions of fact assertions about people, places, family relationships, and life events. Data like this cannot be fully utilized until a person or process locates the data in the document text, extracts it, and structures it with respect to an ontology or database schema. Yet, in the family history industry and other industries, data in lists goes largely unused because no known approach adequately addresses all of the costs, challenges, …
Arimaa: Developing A Higher Ranked Fall Back Move Generator Using A Relational Database, Patrick Mckee
Arimaa: Developing A Higher Ranked Fall Back Move Generator Using A Relational Database, Patrick Mckee
Theses and Dissertations
Our approach to playing the game of Arimaa understands that the game was created to showcase the limits of brute force computing power. Using a relational database, we will be able to view similar situations that have already been played out, inventory a number of suitable reactions and make the best move given a number of attributes. This results in us making a decision that can theoretically result in a win, and hopefully will. Measurable positive results have been procured specifically from the area of concentration component of the research. In the area of concentration component we target a specific …
Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson
Intelligent Indexing: A Semi-Automated, Trainable System For Field Labeling, Robert T. Clawson
Theses and Dissertations
We present Intelligent Indexing: a general, scalable, collaborative approach to indexing and transcription of non-machine-readable documents that exploits visual consensus and group labeling while harnessing human recognition and domain expertise. In our system, indexers work directly on the page, and with minimal context switching can navigate the page, enter labels, and interact with the recognition engine. Interaction with the recognition engine occurs through preview windows that allow the indexer to quickly verify and correct recommendations. This interaction is far superior to conventional, tedious, inefficient post-correction and editing. Intelligent Indexing is a trainable system that improves over time and can provide …
Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill
Measuring Human Workload In Unmanned Aerial Vehicles, Timothy J. Gledhill
Theses and Dissertations
Unmanned aerial systems (UASs) often require multiple human operators fulfilling diverse roles for safe and correct operation. Reliably designing the human interaction, autonomy, and decision making aspects of these systems requires the use of modeling. We propose a conceptual model that models human machine interaction systems as a group of actors connected by a network of communication channels. We present a simulation framework implemented in Java, with an optional XML model parser that can be analyzed using the Java Pathfinder (JPF) model checker. We propose two human workload metrics based on a taxonomy extracted from the relevant literature. Using the …
A Method To Develop Neck Injury Criteria To Aid Design And Test Of Escape Systems Incorporating Helmet Mounted Displays, Jeffrey C. Parr
A Method To Develop Neck Injury Criteria To Aid Design And Test Of Escape Systems Incorporating Helmet Mounted Displays, Jeffrey C. Parr
Theses and Dissertations
HMDs are becoming common human-machine interface equipment in manned military flight, but introducing this equipment into the overall aircraft escape system poses new and significant system design, development, and test concerns. Although HMDs add capabilities, which improve operator performance, the increased capability is often accompanied by increased head supported mass. The increased mass can amplify the risk of pilot neck injury during ejection when compared to lighter legacy helmets. Currently no adequate USAF neck injury criteria exist to effectively guide the requirements, design, and test of escape systems for pilots with HMDs. This research effort presents a novel method to …
Browser-Based Manual Encryption, Yuanzheng Song
Browser-Based Manual Encryption, Yuanzheng Song
Theses and Dissertations
Billions of web-based email and chat messages are sent over the Internet every day. However, very few service providers support end-to-end privacy protection. While providing security for these messages is technically feasible, usability remains a challenge in this field. Recent research attempts to hide security details like key management and encryption in order to make the system more usable. However usability studies demonstrated that hiding these details may confuse the user and contribute to mistakes (e.g., sending out an email in plaintext when the user thought it would be encrypted). In an effort to increase trust and eliminate mistakes, this …
Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang
Complex Network Analysis For Scientific Collaboration Prediction And Biological Hypothesis Generation, Qing Zhang
Theses and Dissertations
With the rapid development of digitalized literature, more and more knowledge has been discovered by computational approaches. This thesis addresses the problem of link prediction in co-authorship networks and protein--protein interaction networks derived from the literature. These networks (and most other types of networks) are growing over time and we assume that a machine can learn from past link creations by examining the network status at the time of their creation. Our goal is to create a computationally efficient approach to recommend new links for a node in a network (e.g., new collaborations in co-authorship networks and new interactions in …
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
#Mplp: A Comparison Of Domain Novice And Expert User-Generated Tags In A Minimally Processed Digital Archive, Edward A. Benoit Iii
Theses and Dissertations
The high costs of creating and maintaining digital archives precluded many archives from providing users with digital content or increasing the amount of digitized materials. Studies have shown users increasingly demand immediate online access to archival materials with detailed descriptions (access points). The adoption of minimal processing to digital archives limits the access points at the folder or series level rather than the item-level description users' desire. User-generated content such as tags, could supplement the minimally processed metadata, though users are reluctant to trust or use unmediated tags. This dissertation project explores the potential for controlling/mediating the supplemental metadata from …
A Computer Learning Environment For Novice Java Programmers That Supports Cognitive Load Reducing Adaptations And Dynamic Visualizations Of Computer Memory, James Stephen Williams
A Computer Learning Environment For Novice Java Programmers That Supports Cognitive Load Reducing Adaptations And Dynamic Visualizations Of Computer Memory, James Stephen Williams
Theses and Dissertations
Learning to program a computer is difficult for many. The Learning Edge Momentum hypothesis suggests that the difficulty may be due to the tightly integrated nature of programming concepts and adapting the way curriculum is offered may have a significant influence on the outcomes. We investigate applying cognitive load reducing methods to instruction of the introductory programming concepts of declaration, assignment and sequence, using a new learning environment that an instructor can adapt for a specific example or that a student can personalize for amount and modality of content provided. Our study has three learning surveys. Each learning survey has …
Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton
Communicating Affective Meaning From Software To Wetware Through The Medium Of Digital Art, R David Norton
Theses and Dissertations
Computational creativity is a new and developing field of artificial intelligence concerned with computational systems that either autonomously produce original and functional products, or that augment the ability of humans to do so. As the role of computers in our daily lives is continuing to expand, the need for such systems is becoming increasingly important. We introduce and document the development of a new “creative” system, called DARCI (Digital ARtist Communicating Intention), that is designed to autonomously create novel artistic images that convey linguistic concepts to the viewer. Within the scope of this work, the system becomes capable of creating …
Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter
Using A Model Of Temporal Latency To Improve Supervisory Control Of Human-Robot Teams, Kyle Lee Blatter
Theses and Dissertations
When humans and remote robots work together on a team, the robots always interact with a human supervisor, even if the interaction is limited to occasional reports. Distracting a human with robotic interactions doesn't pose a problem so long as the inclusion of robots increases the team's overall effectiveness. Unfortunately, increasing the supervisor's cognitive load may decrease the team's sustainable performance to the point where robotic agents are more a liability than an asset. Present approaches resolve this problem with adaptive autonomy, where a robot changes its level of autonomy based on the supervisor's cognitive load. This thesis proposes to …
Nderlidhja Mes Rrjetit Fiks Dhe Rrjetit Mobil, Saranda Xhokli
Nderlidhja Mes Rrjetit Fiks Dhe Rrjetit Mobil, Saranda Xhokli
Theses and Dissertations
Qëllimi i punimit tim është paraqitja e ndërlidhjes të rrjetit fiks dhe rrjetit mobil të telekomit të Kosovës, teknologji të cilat bashkjetojnë për mëse 5 vite dhe I japin shërbime abonentëve, duke përfshirë organizimit të shtyllës kurrizore të rrjetit transmetues të Kosovës i cili zhvillohet nëpërmjet kabllit optik, sistemti transmetues PDH/SDH në skaje të të cilave janë të lidhura paisjet komutuese të paketëve IP të quajtura SOFT SWICH i cili është i vendosur në qendër dhe paraqet boshtin kurrizor të telekomit si dhe nderlidhjen me rrjetin e telefonisë mobile GSM 2.75 dhe në parim paraqet shpirtin komunikues i ndërlidhur në …
Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan
Slice—N—Dice Algorithm Implementation In Jpf, Eric S. Noonan
Theses and Dissertations
This work deals with evaluating the effectiveness of a new verification algorithm called slice--n--dice. In order to evaluate the effectiveness of slice--n--dice, a vector clock POR was implemented to compare it against. The first paper contained in this work was published in ACM SIGSOFT Software Engineering Notes and discusses the implementation of the vector clock POR. The results of this paper show the vector clock POR performing better than the POR in Java Pathfinder by at least a factor of two. The second paper discusses the implementation of slice--n--dice and compares it against other verification techniques. The results show that …
Autocompletion Without Static Typing, Nicholas Mckay Shelley
Autocompletion Without Static Typing, Nicholas Mckay Shelley
Theses and Dissertations
Code completion systems act both as a way to decrease typing and as a way to easily access documentation, both implicit and explicit. The former is typically done by completing known variable or function names, while the latter is done by providing a list of possible completions or by providing convenient views of or access to documentation. Because static type information makes these goals possible and feasible for qualifying languages, many improvements to completion systems are focused on improving the order of results or trimming less-valuable results. It follows that almost all validation techniques for this work have focused on …
Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner
Improved Computer-Generated Simulation Using Motion Capture Data, Seth A. Brunner
Theses and Dissertations
Ever since the first use of crowds in films and videogames there has been an interest in larger, more efficient and more realistic simulations of crowds. Most crowd simulation algorithms are able to satisfy the viewer from a distance but when inspected from close up the flaws in the individual agent's movements become noticeable. One of the bigger challenges faced in crowd simulation is finding a solution that models the actual movement of an individual in a crowd. This paper simulates a more realistic crowd by using individual motion capture data as well as traditional crowd control techniques to reach …
Towards An Automated System For Evaluation Of Visualizations, Douglas Taggart
Towards An Automated System For Evaluation Of Visualizations, Douglas Taggart
Theses and Dissertations
The Information Visualization field focuses on the visualization of abstract data, and with the growing interest in big data analysis, the need for analyzing complex datasets is nowadays highly relevant. With the growing amount and diversity of these datasets new and exciting ways to visualize them are being developed. However, being able to thoroughly test and evaluate the effectiveness of these new visualization techniques is an arduous manual process. Moreover, different researchers hold different opinions on how to thoroughly evaluate a new visualization method. A step towards automating the process of evaluation of visualizations, called the Framework for the Evaluation …
Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr.
Necessary And Sufficient Conditions For State-Space Network Realization, Philip E. Paré Jr.
Theses and Dissertations
This thesis presents the formulation and solution of a new problem in systems and control theory, called the Network Realization Problem. Its relationship to other problems, such as State Realization and Structural Identifiability, is shown. The motivation for this work is the desire to completely quantify the conditions for transitioning between different mathematical representations of linear time-invariant systems. The solution to this problem is useful for theorists because it lays a foundation for quantifying the information cost of identifying a system's complete network structure from the transfer function.