Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

College for Professional Studies

Articles 1 - 30 of 253

Full-Text Articles in Physical Sciences and Mathematics

Model For Predicting Bluetooth Low Energy Micro-Location Beacon Coin Cell Battery Lifetime, Donna Auguste Jan 2015

Model For Predicting Bluetooth Low Energy Micro-Location Beacon Coin Cell Battery Lifetime, Donna Auguste

Regis University Student Publications (comprehensive collection)

Bluetooth Low Energy beacon devices, typically operating on coin cell batteries, have emerged as key components of micro-location wireless sensor networks. To design efficient and reliable networks, designers require tools for predicting battery and beacon lifetime, based on design parameters that are specific to micro-location applications. This design science research contributes to the implementation of an artifact functioning as a predictive tool for coin cell battery lifetime when powering Bluetooth Low Energy beacon devices. Building upon effective and corroborated components from other researchers, the Beacon Lifetime Model 1.0 was developed as a spreadsheet workbook, providing a user interface for designers …


Evaluation Of Sql Performance Tuning Features In Oracle Database Software, Katarzyna Marta Dobies Aug 2013

Evaluation Of Sql Performance Tuning Features In Oracle Database Software, Katarzyna Marta Dobies

Regis University Student Publications (comprehensive collection)

Timely access to data is one of the most important requirements of database management systems. Having access to data in acceptable time is crucial for efficient decision making. Tuning inefficient SQL is one of the most important elements of enhancing performance of databases. With growing repositories and complexity of underlying data management systems, maintaining decent levels of performance and tuning has become a complicated task. DBMS providers acknowledge this tendency and developed tools and features that simplify the process. DBAs and developers have to make use of these tools in the attempt to provide their companies with stable and efficient …


Oracle Cost Based Optimizer Correlations, Robert Apple Aug 2013

Oracle Cost Based Optimizer Correlations, Robert Apple

Regis University Student Publications (comprehensive collection)

Database systems use optimizers on queries to select execution pathways that are supposed to provide optimal performance. The Oracle database version of this technology is called the Cost Based Optimizer (CBO). Researchers have studied whether Oracle optimizer estimates could be correlated to execution speeds with a high degree of confidence, but have found that correlating optimizer cost estimates with actual execution speed to be problematic and unreliable. If possible, however, such correlations would be helpful to developers who are tasked with query creation and optimization. Although much has been written on databases, the academic literature on optimizers was sparse. To …


The Use Of Vulnerability Assessments: A Survey, Charles D. Lybrand Jul 2013

The Use Of Vulnerability Assessments: A Survey, Charles D. Lybrand

Regis University Student Publications (comprehensive collection)

One of the most significant challenges faced by senior business and technology managers is securing organizational data in light of rising threats and compliance requirements. The use of vulnerability assessments has stood out as one strategy to help protect against malicious computer attacks. Vulnerability assessments are conducted to identify security holes within information systems, including networks, servers, and applications. These assessments can be performed by an organization's internal staff or outsourced to a third-party vendor. Outsourcing is especially important for small organizations who typically do not have the resources or expertise to conduct their own vulnerability assessment. This thesis will …


A Study Of Mongodb And Oracle In An E-Commerce Environment, Aaron Ploetz Jul 2013

A Study Of Mongodb And Oracle In An E-Commerce Environment, Aaron Ploetz

Regis University Student Publications (comprehensive collection)

As worldwide e-commerce expands, businesses continue to look for better ways to meet their evolving needs with web solutions that scale and perform adequately. Several online retailers have been able to address scaling challenges through the implementation of NoSQL databases. While architecturally different from their relational database counterparts, NoSQL databases typically achieve performance gains by relaxing one or more of the essential transaction processing attributes of atomicity, consistency, isolation, and durability (ACID). As with any emerging technology, there are both critics and supporters of NoSQL databases. The detractors claim that NoSQL is not safe and is at a greater risk …


Development Of An Api As A Solution To Data Insularity Amongst Dietary-Need Applications, Raphael Lapuma Apr 2013

Development Of An Api As A Solution To Data Insularity Amongst Dietary-Need Applications, Raphael Lapuma

Regis University Student Publications (comprehensive collection)

When multiple competing applications in the same field use only their own sets of user-generated review data and do not collaborate with other applications, data is used in isolation. This factor, which the author will refer to as "data insularity," segregates each application's community of users from other applications' communities, thus creating a limited and fragmented set of data, which discourages the creation of new applications in the industry, and adversely affects the end user. This study will propose a prototype API for applications in the restaurant industry as a solution to the limited and insular use of data amongst …


Agile And Evm For The Dod: A Review Of The Challenges And A New Approach To Solve Them, Roberta Winterowd Apr 2013

Agile And Evm For The Dod: A Review Of The Challenges And A New Approach To Solve Them, Roberta Winterowd

Regis University Student Publications (comprehensive collection)

Department of Defense (DoD) acquisitions must improve program performance while working within budgetary constraints. The DoD community shows an interest in utilizing Agile methodologies, but struggles to reap Agile's benefits. They encountered challenges including the historically built up processes that enforce heavy-weight oversight; the outdated, manufacturing focused Work Breakdown Structures (WBS) provided in DoD Handbook: Work Breakdown Structures (WBS) for Defense Material Items (MIL-STD-881C); and the inability of the traditional waterfall based processes to accommodate iterative development. The author used the scientific method to review the documented issues encountered when using Agile on a DoD program within the constraints of …


Lean Principles:: Can Proven Manufacturing Techniques Benefit An Information Technology Organization?, Erik D. Kim Feb 2013

Lean Principles:: Can Proven Manufacturing Techniques Benefit An Information Technology Organization?, Erik D. Kim

Regis University Student Publications (comprehensive collection)

The benefits of Lean Principles have been reaped in manufacturing for many years and have been seen recently in other verticals. A comprehensive review of the scientific literature exposed that within the information technology field, Lean Principles remains relatively unknown or used. As corporate senior management seek to save costs, information technology needs to provide clear and concise guidance on how to maximize production efficiencies while minimizing costs. If a company cannot leverage information technology properly, staffing and budget cuts are likely. This paper discusses the potential benefits for information technology organizations to utilize Lean Principles. A case study revealed …


Ssd Flash Drives Used To Improve Performance With Clarity Data Warehouse, Douglas Ervin Jan 2013

Ssd Flash Drives Used To Improve Performance With Clarity Data Warehouse, Douglas Ervin

Regis University Student Publications (comprehensive collection)

Since the introduction of solid-state devices (SSD), both storage area network (SAN) administrators and database administrators (DBA) have imagined the performance gains promised by replacing hard disk drives (HDD). The initial testing in the laboratory did not promise those gains in the real world. The SSD vendors worked between 2007 and 2010 to improve performance, which in industry standard tests showed steady progress. Despite the gains in the laboratory, there were few examples of real world usage particularly in the field of data warehousing. The process of extracting, transforming and loading (ETL) places extreme loads on the ability of the …


Software Requirements As Executable Code, Karen Eileen Wasielewski Morand Dec 2012

Software Requirements As Executable Code, Karen Eileen Wasielewski Morand

Regis University Student Publications (comprehensive collection)

This project analyzed the effectiveness of using Story Testing frameworks to create an application directly from user specifications. It did this by taking an example business application with "traditional" specifications and rewriting those specifications in three different Story Testing Frameworks - Cucumber, FitNesse, and JBehave. Analysis of results drew the following conclusions: 1) Story Testing can help prove a project's completeness, 2) Specifications are still too technical, 3) Implementation is not overly complex, and 4) Story Testing is worth it. It proposed future research around evaluating natural languages and seeking more user-friendly ways of writing specifications in a natural language.


Data Integration: A Case Study In The Financial Services Industry, Louis Epie Dec 2012

Data Integration: A Case Study In The Financial Services Industry, Louis Epie

Regis University Student Publications (comprehensive collection)

Current economic conditions result in banks participating in multiple mergers and acquisitions. This results in banks inheriting silo and heterogeneous systems. For banks to remain competitive, they must create a strategy to integrate data from these acquired systems in a dynamic, efficient, and consumable manner. This research considers a case study of a large financial services company that has successfully integrated data from different sources. In addition this research investigates endeavors that experts in the field have undertaken to develop architectures that address the problems with data integration and appropriate solutions.


A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively Dec 2012

A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively

Regis University Student Publications (comprehensive collection)

The use of software defined communications systems is growing incredibly fast. The field of software engineering as a discipline has not adequately addressed the subject of software portability which makes large and costly software development efforts less ready to port to future platforms. By understanding the causes of portability problems, they can either be avoided altogether in development or very well documented so that they are easier to overcome in future efforts. Literature, case studies, and surveys are used to collect opinions and information about large software programs where portability is a desirable characteristic in order to best establish the …


Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor Nov 2012

Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor

Regis University Student Publications (comprehensive collection)

This study investigates XML as a single source, recommending solutions and defining future needs for educators to manage student-centered educational content for diverse user preferences and multi-modal delivery. This research proposes a simplified XML single source model for educational course content management and XSL transformation of course material into multi-modal display/output that enables student-centered learning. The reviewed literature exposed four problem areas related to content management in which an XML single source might be a solution. Reviewed and synthesized literature related to XML into a cubed relationship with opposing the sides of the cube (content management/single source, corporate goals/educational goals …


Extended Bridge Software Design Pattern, Andrew J. Haigh Nov 2012

Extended Bridge Software Design Pattern, Andrew J. Haigh

Regis University Student Publications (comprehensive collection)

Software engineers are taught that they should separate form and function. This allows a user interface or front-end to be designed and implemented independently of the engine or back-end. Using an abstracted interface class provides the opportunity to develop different user interfaces for the same back-end, as each new user interface will all be derived from this agreed upon abstracted interface. Using the Bridge pattern allows the user to also decouple the abstraction from its implementation, providing additional flexibility as they developed multiple user interfaces. However, user interfaces are typically designed as a single unit, the renderer, even the Bridge …


Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells Oct 2012

Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells

Regis University Student Publications (comprehensive collection)

A private High Technology firm whose headquarters are located in the Midwest has just completed several upgrades to replace an in-house legacy application system in which the primary use was to track defects of the firm's custom made software. The firm's implementation of a third party's software suite to replace the in-house legacy application was studied using a case study method, which implemented key performance indicators to the change theory called "The Dynamics of Planned Change" introduced by Lippitt, Watson, and Westley. The key performance indicators were introduced as a way to determine if the firm's actions could be validated …


Transitioning From Relational To Nosql: A Case Study, John Mcphillips Aug 2012

Transitioning From Relational To Nosql: A Case Study, John Mcphillips

Regis University Student Publications (comprehensive collection)

Data storage requirements have increased dramatically in recent years due to the explosion in data volumes brought about by the Web 2.0 era. Changing priorities for database system requirements has seen NoSQL databases emerge as an alternative to relational database systems that have dominated this market for over 40 years. Web-enabled, always on applications mean availability of the database system is critically important as any downtime can translate in to unrecoverable financial loss. Cost is also hugely important in this era where credit is difficult to obtain and organizations look to get the maximum from their IT infrastructure from the …


Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling Aug 2012

Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling

Regis University Student Publications (comprehensive collection)

The practice of knowledge management is becoming pervasive in the modern business world. Yet, as the corporate world globalizes at an alarming rate, the process of how knowledge is captured and shared does not address the cultural nuances of those new participants spread across nearly every global region. Academically, knowledge management itself does rely on three primary pillars for success; those being process, technology, and culture. However, the culture aspect in the formal knowledge programs is more closely aligned with influencing users to share knowledge that they would otherwise hold close as an asset of their gained expertise. While this …


Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina May 2012

Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina

Regis University Student Publications (comprehensive collection)

This document examines the efficiencies of the PeopleSoft Enterprise Change Assistant (ECA) in performing upgrades to the PeopleSoft Enterprise software applications. The ECA tool increases quality of upgrades through the reduction of manual steps and, in doing so, limits risk of manual errors. The PeopleSoft Enterprise software upgrade process is a complicated and time-consuming process. Because the PeopleSoft applications are business critical systems, the upgrade of the PeopleSoft applications needs to be performed in a careful and timely manner. The PeopleSoft Enterprise Change Assistant was developed to automate many of the processes involved in the upgrade. It provides a means …


Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg Apr 2012

Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg

Regis University Student Publications (comprehensive collection)

Senior managers are challenged to measure the success of their IT systems when justifying technology investments needed to meet the organization"â„¢s mission. Due to increasing implementation of mobile technology, enterprise adoption of smartphones is no exception. Traditionally, the DeLone and McLean Information Systems (IS) Success Model has been proven as a valid framework for measuring IS success. However, it has not been updated to address the success variables related to mobile technology. Many studies on mobile technology have reviewed mobile success, but none have attempted theoretical assimilation. This thesis attempts to correct this situation by examining the DeLone and McLean …


Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo Jan 2012

Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo

Regis University Student Publications (comprehensive collection)

In this study, I intend to show how text based unstructured data, such as word processor documents and e-mails, can be systematically parsed for instances of data classes. Data classes can be any data type that can be fully described using the defined syntax of regular expressions. Examples of data classes can include SHA1, or MD5 hash values, Internet Protocol (IP) addresses, or any other data type whose format is well defined. Furthermore, possible correlations between datasets may be identified by grouping instances of equal or similar values within a data class. This approach of utilizing regular expressions to define …


The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson Dec 2011

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson

Regis University Student Publications (comprehensive collection)

Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first …


An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski Nov 2011

An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski

Regis University Student Publications (comprehensive collection)

Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID"â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication …


Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal Nov 2011

Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal

Regis University Student Publications (comprehensive collection)

Data Warehouse applications are designed basically to provide the business communities with accurate and consolidated information. The objective of Data Warehousing applications are not just for collecting data and reporting, but rather for analyzing, it requires technical and business expertise tools. To achieve business intelligence it requires proper tools to be selected. The most commonly used Business intelligence (BI) technologies are Online Analytical Processing (OLAP) and Reporting tools for analyzing the data and to make tactical decision for the better performance of the organization, and more over to provide quick and fast access to end user request. This study will …


Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza Nov 2011

Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza

Regis University Student Publications (comprehensive collection)

Shotgun proteomics refers to the direct analysis of complex protein mixtures to create a profile of the proteins present in the cell. These profiles can be used to study the underlying biological basis for cancer development. Closely studying the profiles as the cancer proliferates reveals the molecular interactions in the cell. They provide clues to researchers on potential drug targets to treat the disease. A little more than a decade old, shotgun proteomics is a relatively new form of discovery, one that is data intensive and requires complex data analysis. Early studies indicated a gap between the ability to analyze …


Continuous Monitoring In The Cloud Environment, Victoria Nyffeler Oct 2011

Continuous Monitoring In The Cloud Environment, Victoria Nyffeler

Regis University Student Publications (comprehensive collection)

The National Institute of Standards and Technology introduced a risk management framework that concludes with a process for continuous monitoring. Continuous monitoring is a way to gain near real-time insight into the security health of an information technology environment. The cloud environment is unique from other environments in the way that resources are virtualized and shared among many cloud tenants. This type of computing has been gaining popularity as a solution for organizations to purchase resources as an on-demand service in the same way that an organization purchases utilities today. In order to experience the benefits promised by the emergence …


An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy Oct 2011

An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy

Regis University Student Publications (comprehensive collection)

The emergency 9-1-1 service is a vital part of our nation"â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and …


The Insider Threat, Jacinda L. Wunderlich Oct 2011

The Insider Threat, Jacinda L. Wunderlich

Regis University Student Publications (comprehensive collection)

The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …


Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean Sep 2011

Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean

Regis University Student Publications (comprehensive collection)

Many companies have looked to outsourcing Information Technology infrastructure and business processes as a means to save capital and streamline company business and assets. While companies initially approach outsourcing engagements concentrating on the migration of data and services to the vendor company, they rarely take into account potential issues that could possibly cause an outsourcing engagement to fail. Failure to address these potential issues within the contract can lead a business to be stuck in an outsourcing engagement that offers little to no benefit to the company. This project presents the details of a survey performed at a business that …


Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn Sep 2011

Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn

Regis University Student Publications (comprehensive collection)

This thesis explores the problems that exist today with perimeter security in data communications specifically the disparate architecture that exists to mitigate risk. Currently there are many different components to the enterprise security perimeter that are not cohesive and do not collaborate well to form an efficient, scalable, operationally supportable gateway design. The thesis breaks down this problem by illustrating the shortcomings of current technologies. These illustrations are used in conjunction with published research and authored research to provide solid footing for the idea of a unified threat management or UTM model. In this model, threat prevention techniques are consolidated …


Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan Aug 2011

Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan

Regis University Student Publications (comprehensive collection)

The Internet, which was originally developed for academic purposes, has expanded and been applied to commercial and business enterprises. It is possible to purchase airline tickets, check bank balances and communicate through e-mail with each other through the Internet. These services can all be performed relatively easily with the proliferation of Internet Service Providers and the lower cost of Personal Computers. The development of the Internet has also had a huge impact on businesses with the growth of e-commerce, e-banking and the tremendous growth in email traffic. There is however a negative impact to this development of the Internet with …