Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

Theses/Dissertations

2016

Discipline
Keyword
Publication

Articles 61 - 80 of 80

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Method Call Tree For Comprehensive Detection Of Symptoms Of Cross Cutting Concerns, Saleem Obaidullah Mir Jan 2016

Enhanced Method Call Tree For Comprehensive Detection Of Symptoms Of Cross Cutting Concerns, Saleem Obaidullah Mir

CCE Theses and Dissertations

Aspect oriented programming languages provide a new enhanced composition mechanism between the functional sub units as compared to earlier non aspect oriented languages. For this reason the refactoring process requires a new approach to the analysis of existing code that focuses on how the functions cross cut one another. Aspect mining is a process of studying an existing program in order to find these cross cutting functions or concerns so they may be implemented using new aspect oriented constructs and thus reduce the complexity of the existing code. One approach to the detection of these cross cutting concerns generates a …


An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye Jan 2016

An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye

CCE Theses and Dissertations

The proliferation of information systems (IS) over the past decades has increased the demand for system authentication. While the majority of system authentications are password-based, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user to ensure their passwords are more complex and consequently stronger. In addition to meeting a certain complexity threshold, the password must also be changed on a regular basis. As the cognitive load increases on the employees using complex passwords and changing them often, they may have difficulty recalling their passwords. As such, the …


Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti Jan 2016

Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti

CCE Theses and Dissertations

Agile software engineering has been a popular methodology to develop software rapidly and efficiently. However, the Agile methodology often favors Functional Requirements (FRs) due to the nature of agile software development, and strongly neglects Non-Functional Requirements (NFRs). Neglecting NFRs has negative impacts on software products that have resulted in poor quality and higher cost to fix problems in later stages of software development.

This research developed the CEP “Capture Elicit Prioritize” methodology to effectively gather NFRs metadata from software requirement artifacts such as documents and images. Artifact included the Optical Character Recognition (OCR) artifact which gathered metadata from images. The …


Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew Jan 2016

Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew

CCE Theses and Dissertations

As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …


Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra Jan 2016

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra

CCE Theses and Dissertations

The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.

The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …


Evaluation Of Supervised Machine Learning For Classifying Video Traffic, Farrell R. Taylor Jan 2016

Evaluation Of Supervised Machine Learning For Classifying Video Traffic, Farrell R. Taylor

CCE Theses and Dissertations

Operational deployment of machine learning based classifiers in real-world networks has become an important area of research to support automated real-time quality of service decisions by Internet service providers (ISPs) and more generally, network administrators. As the Internet has evolved, multimedia applications, such as voice over Internet protocol (VoIP), gaming, and video streaming, have become commonplace. These traffic types are sensitive to network perturbations, e.g. jitter and delay. Automated quality of service (QoS) capabilities offer a degree of relief by prioritizing network traffic without human intervention; however, they rely on the integration of real-time traffic classification to identify applications. Accordingly, …


The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, Jason Alan Pittman Jan 2016

The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, Jason Alan Pittman

CCE Theses and Dissertations

There is a significant gap in the body of knowledge concerning time-compressed multimedia instruction. Although research indicates that there is no loss in learning through well-designed multimedia instruction compressed at 25%, research is lacking that analyzes the effects of time-compression with learner-control included in the multimedia instruction. The aim of the study was to address this gap in the research by integrating learner-control into the interface of a time-compressed multimedia instructional lesson using similar methodologies from previous research.

Effects were analyzed of time-compressed learner-controlled multimedia instruction on learning and perceived cognitive load. Additionally, the researcher employed a participant population from …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton Jan 2016

Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton

CCE Theses and Dissertations

Completing activities online are a part of everyday life, both professionally and personally. But, conducting daily operations, interacting, and sharing information on the Internet does not come without its risks as well as a potential for harm. Substantial financial and information losses for individuals, organizations, and governments are reported regularly due to vulnerabilities as well as breaches caused by insiders. Although advances in Information Technology (IT) have been significant over the past several decades when it comes to protection of corporate information systems (IS), human errors and social engineering appear to prevail in circumventing such IT protections. While most employees …


Using Mobile Phones For Teaching And Learning In Chinese Traditional Undergraduate Education, Guchun Huang Jan 2016

Using Mobile Phones For Teaching And Learning In Chinese Traditional Undergraduate Education, Guchun Huang

CCE Theses and Dissertations

Mobile learning is the new global trend of educational innovation with information and communication technologies. Mobile phones are one major type of mobile technology that can be used for mobile learning. As a highly popular possession among Chinese undergraduate students, as well as among general population, mobile phone usage for learning purposes in the context of Chinese traditional undergraduate education warrants attention from both the education practitioners and researchers. However, very few institutional efforts of promoting mobile phone integrated learning have been reported within the scope of Chinese traditional undergraduate education. A qualitative phenomenological research study was conducted with the …


A Study Of Data Sharing Practices Within Scholarly Research Communities, Mary Harward Jan 2016

A Study Of Data Sharing Practices Within Scholarly Research Communities, Mary Harward

CCE Theses and Dissertations

Recent literature acknowledges the importance of data and effective data management strategies to facilitate collaboration between disciplines of research. Likewise, understanding the policies and practices that support data sharing is a growing area of research in the fields of information and social studies of science. Shared data allow researchers to build on fellow researchers’ work to enrich and facilitate advancements in science. While much has been written to identify the elements that adversely affect data sharing in scholarly research, a definitive framework remains unclear. Several theories have been presented to explain this shortfall; however, the reasons are highly diverse. Some …


Assistive Technology Instruction In Teacher Professional Development, David N. Schaaf Jan 2016

Assistive Technology Instruction In Teacher Professional Development, David N. Schaaf

CCE Theses and Dissertations

Teachers who work with exceptional students have a critical responsibility to ensure these students receive the best possible education. A major part of the students’ education is the implementation of assistive technology in the classroom. Unfortunately, many teachers begin their career with limited knowledge of assistive technology. Therefore, they are dependent on building their knowledge base from other sources. The results of an assessment of one source, professional development courses, are reported. To assess the effectiveness of the professional development program, a comprehensive prescription was developed to identify gaps in the course objectives and make recommendations to improve the program. …


An Investigation Of Factors That Influence Registered Nurses’ Intentions To Use E-Learning Systems In Completing Higher Degrees In Nursing, Pauline G. Little Jan 2016

An Investigation Of Factors That Influence Registered Nurses’ Intentions To Use E-Learning Systems In Completing Higher Degrees In Nursing, Pauline G. Little

CCE Theses and Dissertations

There is an increasing demand for more baccalaureate- and graduate-prepared registered nurses in the United States, to face the healthcare challenges of the 21st century. As a strategy to meet this need, educational institutions are expanding electronic learning in nursing education; however, technology acceptance in education continues to be a concern for educational institutions. In this context, the goal of the study was to investigate factors that potentially influence registered nurses’ intentions to adopt e-learning systems. A theoretical model was used to determine whether perceived value, attitude toward e-learning systems, and resistance to change influence registered nurses’ intentions to use …


Using Diversity Ensembles With Time Limits To Handle Concept Drift, Robert M. Van Camp Jan 2016

Using Diversity Ensembles With Time Limits To Handle Concept Drift, Robert M. Van Camp

CCE Theses and Dissertations

While traditional supervised learning focuses on static datasets, an increasing amount of data comes in the form of streams, where data is continuous and typically processed only once. A common problem with data streams is that the underlying concept we are trying to learn can be constantly evolving. This concept drift has been of interest to researchers the last few years and there is a need for improved machine learning algorithms that are capable of dealing with concept drifts. A promising approach involves using an ensemble of a diverse set of classifiers. The constituent classifiers are re-trained when a concept …


Assessing Knowledge Management Values By Using Intellectual Capital To Measure Organizational Performance, Thuan L. Nguyen Jan 2016

Assessing Knowledge Management Values By Using Intellectual Capital To Measure Organizational Performance, Thuan L. Nguyen

CCE Theses and Dissertations

Measuring knowledge management performance was one of, if not the most challenging knowledge management activities. This study suggested using intellectual capital as a proxy for knowledge management performance in evaluating its impact on organizational performance. The Value Added Intellectual Coefficient model was employed to measure intellectual capital. Although being used widely in research, the model had its limitations. Also, for intellectual capital measurement, there was a lack of guidelines supported by empirical evidence or best practices. The present study aimed to test the classic and a modified version of this model, and based on the results, shed light on whether …


Five-Factor Model As A Predictor For Spoken Dialog Systems, Teresa G. Carter Jan 2016

Five-Factor Model As A Predictor For Spoken Dialog Systems, Teresa G. Carter

CCE Theses and Dissertations

Human behavior varies widely as does the design of spoken dialog systems (SDS). The search for predictors to match a user’s preference and efficiency for a specific dialog interface type in an SDS was the focus of this research. By using personality as described by the Five-Factor Method (FFM) and the Wizard of Oz technique for delivering three system initiatives of the SDS, participants interacted with each of the SDS initiatives in scheduling an airline flight. The three system initiatives were constructed as strict system, which did not allow the user control of the interaction; mixed system, which allowed the …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


Assessing The Effectiveness Of A Fingerprint Biometric And A Biometric Personal Identification Number (Bio-Pin™) When Used As A Multi-Factor Authentication Mechanism, Robert B. Batie Jan 2016

Assessing The Effectiveness Of A Fingerprint Biometric And A Biometric Personal Identification Number (Bio-Pin™) When Used As A Multi-Factor Authentication Mechanism, Robert B. Batie

CCE Theses and Dissertations

The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements …


A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino Jan 2016

A Usability And Learnability Case Study Of Glass Flight Deck Interfaces And Pilot Interactions Through Scenario-Based Training, Thomas James De Cino

CCE Theses and Dissertations

In the aviation industry, digitally produced and presented flight, navigation, and aircraft information is commonly referred to as glass flight decks. Glass flight decks are driven by computer-based subsystems and have long been a part of military and commercial aviation sectors. Over the past 15 years, the General Aviation (GA) sector of the aviation industry has become a recent beneficiary of the rapid advancement of computer-based glass flight deck (GFD) systems.

While providing the GA pilot considerable enhancements in the quality of information about the status and operations of the aircraft, training pilots on the use of glass flight decks …


The Design And Implementation Of Online Radiology Modules Using The Addie Process And Rapid Prototyping, Leslie Bofill Jan 2016

The Design And Implementation Of Online Radiology Modules Using The Addie Process And Rapid Prototyping, Leslie Bofill

CCE Theses and Dissertations

Medical schools in the United States have begun the process of changing the teaching methodologies used in the classroom. The traditional, teacher-centered environment is shifting toward a more student-centered, active learning environment. Part of this shift is the integration of online learning to deliver a continuously expanding medical curriculum by moving content learning outside the classroom and creating active learning activities for the classroom. As more medical schools adopt online learning as a supplemental teaching tool, medical education faculty are taking on the role of instructional designers without having any theoretical knowledge on adult learning theory or online learning practices. …