Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti Dec 2016

Tangible Interaction As An Aid For Object Navigation In 3d Modeling, Sanmathi Dangeti

Open Access Theses

This study introduced an interaction technique that used tangible interaction for 3D modeling. A hybrid interaction technique using a Kinect camera and a smartphone with a gyroscope was developed for the navigating objects in a 3D modeling software. It was then tested on 20 participants categorized as amateurs who had basic 3D/ CAD modeling experience and 20 participants categorized as the experts who had extensive experience working with the modeling software. This research study presents the need for existence of such interaction technique, gaps from the related previous studies, statistical findings from the current study and possible reasons for the …


A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John Dec 2016

A Small-Scale Testbed For Large-Scale Reliable Computing, Jason R. St. John

Open Access Theses

High performance computing (HPC) systems frequently suffer errors and failures from hardware components that negatively impact the performance of jobs run on these systems. We analyzed system logs from two HPC systems at Purdue University and created statistical models for memory and hard disk errors. We created a small-scale error injection testbed—using a customized QEMU build, libvirt, and Python—for HPC application programmers to test and debug their programs in a faulty environment so that programmers can write more robust and resilient programs before deploying them on an actual HPC system. The deliverables for this project are the fault injection program, …


Security Techniques For Sensor Systems And The Internet Of Things, Daniele Midi Dec 2016

Security Techniques For Sensor Systems And The Internet Of Things, Daniele Midi

Open Access Dissertations

Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues.

We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in …


Knowledge Modeling Of Phishing Emails, Courtney Falk Aug 2016

Knowledge Modeling Of Phishing Emails, Courtney Falk

Open Access Dissertations

This dissertation investigates whether or not malicious phishing emails are detected better when a meaningful representation of the email bodies is available. The natural language processing theory of Ontological Semantics Technology is used for its ability to model the knowledge representation present in the email messages. Known good and phishing emails were analyzed and their meaning representations fed into machine learning binary classifiers. Unigram language models of the same emails were used as a baseline for comparing the performance of the meaningful data. The end results show how a binary classifier trained on meaningful data is better at detecting phishing …


Students' Reasoning With Haptic Technologies: A Qualitative Study In The Electromagnetism Domain, Sadhana Balachandran Aug 2016

Students' Reasoning With Haptic Technologies: A Qualitative Study In The Electromagnetism Domain, Sadhana Balachandran

Open Access Theses

With abundant applications in the medical training and entertainment industry, haptic technology is slowly making its way into the realm of science education, particularly in conveying abstract and non-visible concepts. Electric field is one such abstract concept. Past studies have shown that learning concepts such as electric fields in a traditional classroom can be quite challenging since students have a hard time visualizing the phenomena and applying its effects to reason. Furthermore, these concepts are the building blocks for more complex concepts such as matter and molecular interactions. Visuo-haptic devices provide a great platform to enable students to visualize and …


An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel Aug 2016

An Anomaly-Based Intrusion Detection System Based On Artificial Immune System (Ais) Techniques, Harish Valayapalayam Kumaravel

Open Access Theses

Two of the major approaches to intrusion detection are anomaly-based detection and signature-based detection. Anomaly-based approaches have the potential for detecting zero-day and other new forms of attacks. Despite this capability, anomaly-based approaches are comparatively less widely used when compared to signature-based detection approaches. Higher computational overhead, higher false positive rates, and lower detection rates are the major reasons for the same. This research has tried to mitigate this problem by using techniques from an area called the Artificial Immune Systems (AIS). AIS is a collusion of immunology, computer science and engineering and tries to apply a number of techniques …


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according to contexts. …


Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri Aug 2016

Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri

Open Access Dissertations

DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.

With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security …


Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands Aug 2016

Detection Of Communication Over Dnssec Covert Channels, Nicole M. Hands

Open Access Theses

Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant and escalating battle with the writers of malware and other methods of network intrusion to detect and mitigate this threat. Advanced malware behaviors include encryption of communications between the server and infected client machines as well as various strategies for resilience and obfuscation of infrastructure. These techniques evolve to use any and all available mechanisms. As the Internet has grown, DNS has been expanded and has been given security updates. This study analyzed the potential uses …


Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde Aug 2016

Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde

Open Access Theses

The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …


Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky Jan 2016

Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky

ETD Archive

Mergers and acquisitions (M&A) are a common technique used by companies to grow and enter new markets. The success rate of these transactions continues to be less than desired. Information Systems (IS) have been proven to be a key component influencing the success of mergers. While numerous factors have been found to lead to systems integration success, the studies have not analyzed the fit that is required when two organizations and systems are joined. This research focuses on the match between organizational variables of competencies and processes of two merging companies, as well as the match between systems variables of …


Factors That Affect Faculty Use Of Course Management Systems In Traditional Courses At Private 4-Year Historically Black Colleges And Universities: An Empirical Approach, Hyacinth L. Burton Jan 2016

Factors That Affect Faculty Use Of Course Management Systems In Traditional Courses At Private 4-Year Historically Black Colleges And Universities: An Empirical Approach, Hyacinth L. Burton

CCE Theses and Dissertations

The use of information technology to supplement and enhance teaching is prevalent in many higher education institutions (HEIs). HEIs throughout the United States have invested in course management systems (CMS); however, despite heavy investments, faculty use of such systems is limited. Many studies were conducted on the use of CMS in HEIs, but they concentrated on faculty use of such systems at non-Historically Black Colleges and Universities (non-HBCUs). Little has been done on the use of CMS in HBCUs. The goal of this study was to examine factors that affect faculty use of CMS in traditional courses at HBCUs. Facilitating …


Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa Jan 2016

Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa

Walden Dissertations and Doctoral Studies

Business intelligence (BI) allows companies to make faster and better-informed decisions. Unfortunately, implementing BI systems in companies in developing countries is minimal. Limited and costly access to the technology, coupled with the cultural background affecting how people perceive BI, has restricted such implementations. The purpose of this phenomenological study was to explore and describe the lived experiences of chief executive officers (CEOs) in northern Mexico to obtain insight into the challenges of implementing BI systems. Research questions focused on the reasons behind the lack of BI systems implementation and the challenges faced by these officers when implementing a new system. …


Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye Jan 2016

Adoption Of Information And Communication Technology In Nigerian Small- To Medium-Size Enterprises, Kessington Enaye Okundaye

Walden Dissertations and Doctoral Studies

Small- to medium-size enterprises (SMEs) play a vital role in a dynamic economy through job creation, poverty alleviation, and socioeconomic development in developed and developing countries. The purpose of this multiple case study was to explore how SME leaders in Lagos, Nigeria, adopted information and communication technology (ICT) as a business strategy to increase profitability and compete globally. Organizational leaders have adopted ICT so that their organizations can become more efficient, effective, innovative, and globally competitive. This study involved 4 SMEs that had successfully implemented ICT. The participants included 5 SME leaders from each of the SMEs. The data collection …


A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou Jan 2016

A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou

Browse all Theses and Dissertations

Natural Language Understanding (NLU) is a very old research field, which deals with machine reading comprehension. Despite the many years of work and the numerous accomplishments by several researchers in the field, there is still place for significant improvements. Here, our goal is to develop a novel NLU methodology for detecting and extracting event/action associations in technical documents. In order to achieve this goal we present a synergy of methods (Kernel extraction, Formal Language Modeling, Stochastic Petri-nets (SPN) mapping and Event Representation via SPN graph synthesis). In particular, the basic meaning of a natural language sentence is given by its …