Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 89

Full-Text Articles in Physical Sciences and Mathematics

Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson Sep 2008

Model-Driven Performance Analysis, Gabriel A. Moreno, Paulo Merson

Gabriel A. Moreno

Model-Driven Engineering (MDE) is an approach to develop software systems by creating models and applying automated transformations to them to ultimately generate the implementation for a target platform. Although the main focus of MDE is on the generation of code, it is also necessary to support the analysis of the designs with respect to quality attributes such as performance. To complement the model-to-implementation path of MDE approaches, an MDE tool infrastructure should provide what we call model-driven analysis. This paper describes an approach to model-driven analysis based on reasoning frameworks. In particular, it describes a performance reasoning framework that can …


Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry Sep 2008

Transcriptional Responses To Estrogen And Progesterone In Mammary Gland Identify Networks Regulating P53 Activity, Shaolei Lu, Klaus A. Becker, Mary J. Hagen, Haoheng Yan, Amy L. Roberts, Lesley A. Mathews, Sallie S. Schneider, Hava Siegelmann, Kyle J. Macbeth, Stephen M. Tirrell, Jeffrey L. Blanchard, D. Joseph Jerry

Hava Siegelmann

Estrogen and progestins are essential for mammary growth and differentiation but also enhance the activity of the p53 tumor suppressor protein in the mammary epithelium. However, the pathways by which these hormones regulate p53 activity are unknown. Microarrays were used to profile the transcriptional changes within the mammary gland after administration of either vehicle, 17β-estradiol (E), or progesterone (P) individually and combined (EP). Treatment with EP yielded 1182 unique genes that were differentially expressed compared to the vehicle-treated group. Although 30% of genes were responsive to either E or P individually, combined treatment with both EP had a synergistic effect …


Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder Sep 2008

Word Sense Disambiguation In Biomedical Ontologies With Term Co-Occurrence Analysis And Document Clustering, Bill Andreopoulos, Dimitra Alexopoulou, Michael Schroeder

William B. Andreopoulos

With more and more genomes being sequenced, a lot of effort is devoted to their annotation with terms from controlled vocabularies such as the GeneOntology. Manual annotation based on relevant literature is tedious, but automation of this process is difficult. One particularly challenging problem is word sense disambiguation. Terms such as |development| can refer to developmental biology or to the more general sense. Here, we present two approaches to address this problem by using term co-occurrences and document clustering. To evaluate our method we defined a corpus of 331 documents on development and developmental biology. Term co-occurrence analysis achieves an …


A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu Aug 2008

A Context-Driven Content Adaptation Planner For Improving Mobile Internet Accessibility, Stephen Yang, Jia Zhang, Angus Huang, Jeffrey Tsai, Philip Yu

Jia Zhang

This paper presents our design and development of a context-driven content adaptation planner, which dynamically transforms requested Web content into a proper format conforming to receiving contexts (e.g., access condition, network connection, and receiving device). Aiming to establish a semantic foundation for content adaptation, we apply description logics (DLs) to formally define context profiles and requirements and automate content adaptation decision. In addition, the computational overhead caused by content adaptation can be moderately decreased through the reduction of the size of adapted content


Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga Aug 2008

Design And Development Of A University-Oriented Personalizable Web 2.0 Mashup Portal, Jia Zhang, Momtazul Karim, Karthik Akula, Raghu Ariga

Jia Zhang

This paper reports several key challenges and solutions when we apply Web 2.0 mashup technology to build a university-oriented services portal. A two-layer mashup service model is proposed as the underlying basis to support multiple granularities of services mashup. We explore a caching technique to facilitate personalizable services requests. We also report our preliminary practice of exploiting Facebook as a social relationship data source


A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu Aug 2008

A Heuristic Scheduling Scheme In Multiuser Ofdma Networks, Zheng Sun, Zhiqiang He, Ruochen Wang, Kai Niu

Zheng Sun

Conventional heterogeneous-traffic scheduling schemes utilize zero-delay constraint for real-time services, which aims to minimize the average packet delay among real-time users. However, in light or moderate load networks this strategy is unnecessary and leads to low data throughput for non-real-time users. In this paper, we propose a heuristic scheduling scheme to solve this problem. The scheme measures and assigns scheduling priorities to both real-time and non-real-time users, and schedules the radio resources for the two user classes simultaneously. Simulation results show that the proposed scheme efficiently handles the heterogeneous-traffic scheduling with diverse QoS requirements and alleviates the unfairness between real-time …


Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel Aug 2008

Using Bayesian Networks For Candidate Generation In Consistency-Based Diagnosis, Sriram Narasimhan, Ole J. Mengshoel

Ole J Mengshoel

Consistency-based diagnosis relies on the computation of discrepancies between model predictions and sensor observations. The traditional assumption that these discrepancies can be detected accurately (by means of thresholding for example) is in many cases reasonable and leads to strong performance. However, in situations of substantial uncertainty (due, for example, to sensor noise or model abstraction), more robust schemes need to be designed to make a binary decision on whether predictions are consistent with observations or not. However, if an accurate binary decision is not made, there are risks of occurrence of false alarms and missed alarms. Moreover when multiple sensors …


Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael Jul 2008

Überveillance: 24/7 X 365 People Tracking & Monitoring, Mg. Michael, K. Michael

M. G. Michael

No abstract provided.


Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl Jul 2008

Enhancing The Face Of Service-Oriented Capabilities, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

With today’s focus toward discoverable web services, Service-Oriented Architectures (SOA) are becoming increasingly prevalent. To support an effective interaction between services and their clientele, the sophistication of the interface, or face, such services present is of critical importance. Without a rich, expressive nature, such services struggle to satisfy the industry promises of reuse, composability, and reduced inter-component dependencies. Especially relevant for domain-oriented applications, services must present sufficient levels of expression to allow for an effective exchange of relevant context. Further, such communication should be offered in an asynchronous manner to promote both work flow efficiency and limited coupling. This paper …


The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl Jul 2008

The Round Table Model: A Web-Oriented, Agent-Based Approach To Decision-Support Applications, Kym J. Pohl, Jens G. Pohl

Jens G. Pohl

Not unlike King Arthur relying on the infamous Round Table as the setting for consultation with his most trusted experts, agent-based, decision-support systems provide human decision makers with a means of solving complex problems through collaboration with collections of both human and computer-based expert agents. The Round Table Framework provides a formalized architecture together with a set of development and execution tools which can be utilized to design, develop, and execute agent-based, decision-support applications. Based on a three-tier architecture, Round Table incorporates forefront technologies including distributed-object servers, inference engines, and web-based presentation to provide a framework for collaborative, agent-based decision …


Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl Jul 2008

Data, Information, And Knowledge In The Context Of Sils, Michael A. Zang, Jens G. Pohl

Jens G. Pohl

Data, information, and knowledge are becoming increasingly common terms in the literature of the software industry. This terminology originated some time ago in the disciplines of cognitive science and artificial intelligence to reference three closely related but distinct concepts. Traditionally, mainstream software engineering has lumped all three concepts together as data and has only recently begun to distinguish between them. Unfortunately, the popular desire to distinguish between data, information, and knowledge within the mainstream has blurred the individual meanings of the words to the point where there is no longer a clear-cut distinction between them for most people. This problem …


The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl Jul 2008

The Value Of Ontology-Based, Service-Oriented, Distributed Systems In A High Bandwidth Environment, Steven J. Gollery, Jens G. Pohl

Jens G. Pohl

No abstract provided.


Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder Jul 2008

Unraveling Protein Networks With Power Graph Analysis, Loïc Royer, Matthias Reimann, Bill Andreopoulos, Michael Schroeder

William B. Andreopoulos

Networks play a crucial role in computational biology, yet their analysis and representation is still an open problem. Power Graph Analysis is a lossless transformation of biological networks into a compact, less redundant representation, exploiting the abundance of cliques and bicliques as elementary topological motifs. We demonstrate with five examples the advantages of Power Graph Analysis. Investigating protein-protein interaction networks, we show how the catalytic subunits of the casein kinase II complex are distinguishable from the regulatory subunits, how interaction profiles and sequence phylogeny of SH3 domains correlate, and how false positive interactions among high-throughput interactions are spotted. Additionally, we …


Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu Jul 2008

Modeling Of Fermentation Processes Using Online Kernel Learning Algorithm, Yi Liu

Dr. Yi Liu

No abstract provided.


Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu Jul 2008

Adaptive Control Of A Class Of Nonlinear Discrete-Time Systems With Online Kernel Learning, Yi Liu

Dr. Yi Liu

No abstract provided.


Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham Jul 2008

Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham

George H Baker

The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …


Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz Jul 2008

Autonomous Geometric Precision Error Estimation In Low-Level Computer Vision Tasks, Andrés Corrada-Emmanuel, Howard Schultz

Andrés Corrada-Emmanuel

Errors in map-making tasks using computer vision are sparse. We demonstrate this by considering the construction of digital elevation models that employ stereo matching algorithms to triangulate real-world points. This sparsity, coupled with a geometric theory of errors recently developed by the authors, allows for autonomous agents to calculate their own precision independently of ground truth. We connect these developments with recent advances in the mathematics of sparse signal reconstruction or compressed sensing. The theory presented here extends the autonomy of 3-D model reconstructions discovered in the 1990s to their errors.


A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam Jun 2008

A Method And Case Study Of Designing Presentation Module In An Soa-Based Solution Using Configurable Architectural Building Blocks (Abbs), Liang-Jie Zhang, Jia Zhang, Abdul Allam

Jia Zhang

Service-Oriented Architecture (SOA) projects typically pose challenging requirements on software developers such as flexibility, speed to market, and adaptability to ever changing business requirements. In this paper, we propose a novel method of rapidly designing presentation module for an SOA-based solution using fine-grained configurable architectural building blocks (ABBs). An ABB-based presentation pattern derived from industry best practices is presented, associated with a tailored ABB configuration framework. We also introduce a formal way of modeling ABBs and their interactions. Real-life experiences of applying our ABB-based model are condensed into sixteen architectural decision points, which are further applied into a variety of …


Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk Jun 2008

Predicting The Behavior Of A Highly Configurable Component Based Real-Time System, Gabriel A. Moreno, Scott A. Hissam, Daniel Plakosh, Isak Savo, Marcin Stelmarczyk

Gabriel A. Moreno

Software components and the technology supporting component based software engineering contribute greatly to the rapid development and configuration of systems for a variety of application domains. Such domains go beyond desktop office applications and information systems supporting e-commerce, but include systems having real-time performance requirements and critical functionality. Discussed in this paper are the results from an experiment that demonstrates the ability to predict deadline satisfaction of threads in a real-time system where the functionality performed is based on the configuration of the assembled software components. Presented is the method used to abstract the large, legacy code base of the …


A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu Jun 2008

A Game Theory Approach For An Emergency Management Security Advisory System, Cheng-Kuang Wu

Cheng-Kuang Wu

Efficient emergency management must determine how and when to alert and advise the critical and appropriate response units to the danger of terrorist attacks, particularly when available resources are limited. We propose a framework for homeland security advisory system that incorporates two game theory models designed to advise response units and raise the alarm. In the first scheme the interactive behaviors between the elements or participants of the multi-emergency response system and the zone response unit are modeled and analyzed as a non-cooperative game, after which the terrorist threat value is derived from the mixed strategy Nash equilibrium. In the …


Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose Jun 2008

Verifying Semantic Business Process Models In Inter-Operation, George Koliadis, Aditya Ghose

Professor Aditya K. Ghose

Process inter-operation is characterized as cooperative interactions among loosely coupled autonomous constituents to adaptively fulfill system-wide purpose. Issues of inconsistency can be anticipated in inter-operating processes given their independent management and design. To reduce inconsistency (that may contribute to failures) effective methods for statically verifying behavioral interoperability are required. This paper contributes a method for practical, semantic verification of interoperating processes (as represented with BPMN models). We provide methods to evaluate consistency during process design where annotation of the immediate effect of tasks and sub-processes has been provided. Furthermore, some guidelines are defined against common models of inter-operation for scoping …


Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams May 2008

Performance Analysis Of Real-Time Component Architectures: A Model Interchange Approach, Gabriel A. Moreno, Connie U. Smith, Lloyd G. Williams

Gabriel A. Moreno

Model interchange approaches support the analysis of software architecture and design by enabling a variety of tools to automatically exchange performance models using a common schema. This paper builds on one of those interchange formats, the Software Performance Model Interchange Format (S-PMIF), and extends it to support the performance analysis of real-time systems. Specifically, it addresses real-time system designs expressed in the Construction and Composition Language (CCL) and their transformation into the S-PMIF for additional performance analyses. This paper defines extensions and changes to the S-PMIF meta-model and schema required for real-time systems. It describes transformations for both simple, best-case …


Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas May 2008

Distinguishing Between Software Oriented Architecture And Software As A Service: What's In A Name?, Phillip A. Laplante, Jia Zhang, Jeffrey Voas

Jia Zhang

No abstract provided.


Beyond Mere Compliance Of Rfid Regulations By The Farming Community: A Case Study Of The Cochrane Dairy Farm, A. Trevarthen, Katina Michael May 2008

Beyond Mere Compliance Of Rfid Regulations By The Farming Community: A Case Study Of The Cochrane Dairy Farm, A. Trevarthen, Katina Michael

Professor Katina Michael

Radio-frequency identification (RFID) is changing the face of livestock identification and management. Beyond satisfying the regulations of government agencies for livestock to be a part of a national identification system for tracking purposes, farmers are now considering venturing beyond mere basic compliance systems. Once installed, farmers have begun to realize that their initial capital investment into an RFID system holds great strategic potential. The initial outlay while substantial is a once only cost that with a few more application-centric uses can yield a return on investment manifold. This paper presents a case study of the Cochrane Dairy Farm situated on …


Social And Organizational Aspects Of Information Security Management, Katina Michael May 2008

Social And Organizational Aspects Of Information Security Management, Katina Michael

Professor Katina Michael

This paper aims to explore social and organizational aspects of information security management. The changing nature of security is revealed against the backdrop of globalization. It provides a thorough review of literature on the topics of cyberethics as related to information security and transnational law. The objective of the paper is to cover broadly socio-organizational themes providing for the purpose of definition and a basis for further research. It thus raises a number of pressing issues facing organizations today, and offers an overview discussion on potential solutions. The main outcome of the paper is in showing that successful security strategies …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

Professor Katina Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael May 2008

The Social Implications Of Humancentric Chip Implants: A Scenario - ‘Thy Chipdom Come, Thy Will Be Done’, Rodney Ip, Katina Michael, M G. Michael

Professor Katina Michael

Radio frequency identification (RFID) chip implants for humans are no longer the tales of science fiction. Already preliminary findings have shown that the number of people willing to get chipped has increased since the technology’s commercial arrival in 2002, despite the fact that adoption rates have been very low. This investigation presents three case studies of the main users/ innovators of humancentric chip implants. The first case is of a British researcher in an academic institution who has conducted several implant experiments; the second case, is of a hobbyist and entrepreneur who has focused on the use of RFID implants …


Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael May 2008

Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael

Professor Katina Michael

Barcode is a mature automatic identification (auto-ID) technology that has been used in supply chain management (SCM) for several decades. Such has been the domination of the auto-ID technique that it has pervaded all facets of SCM, from item-level identification to transportation applications. It has enjoyed free reign especially in the retail sector. However, recently radio-frequency identification (RFID) has been considered a rival technology, more superior in terms of its power to store and update information instantaneously, and non-line of sight (nLoS) ability to be read. Yet RFID is more costly and for the present barcode is still the most …


Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose May 2008

Human Tracking Technology In Mutual Legal Assistance And Police Inter-State Cooperation In International Crimes, Katina Michael, G. L. Rose

Professor Katina Michael

The objective of this paper is to explore the role of human tracking technology, primarily the use of global positioning systems (GPS) in locating individuals for the purposes of mutual legal assistance (MLA), and providing location intelligence for use in inter-state police cooperation within the context of transnational crime. GPS allows for the 24/7 continuous real-time tracking of an individual, and is considered manifold more powerful than the traditional visual surveillance often exercised by the police. As the use of GPS for human tracking grows in the law enforcement sector, federal and state laws in many countries are to a …


A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael May 2008

A Research Note On Ethics In The Emerging Age Of Überveillance, M. G. Michael, Sarah Jean Fusco, Katina Michael

Professor Katina Michael

Advanced location-based services (A-LBS) for humancentric tracking and monitoring are now emerging as operators and service providers begin to leverage their existing infrastructure and invest in new technologies, toward increasingly innovative location application solutions. We can now point to humancentric tracking and monitoring services where the person (i.e. subject) has become an active node in the network. For example, in health applications through the use of embedded technologies such as radio-frequency identification (RFID) or in campus applications through the use of electronic monitoring techniques in the form of global positioning systems (GPS). These technologies, for the greater part, have been …