Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Nebraska at Omaha

Series

2018

Discipline
Keyword
Publication

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo Dec 2018

Marktplatz Zur Koordinierung Und Finanzierung Von Open Source Software, Georg J.P. Link, Malvika Rao, Don Marti, Andy Leak, Rich Bodo

Information Systems and Quantitative Analysis Faculty Publications

Open Source ist ein zunehmend beliebter Kollaborationsmechanismus für die Entwicklung von Software, auch in Unternehmen. Unsere Arbeit schafft die fehlende Verbindung zwischen Open Source Projekten, Unternehmen und Märkten. Ohne diese Verbindung wurden Koordinations- und Finanzierungsprobleme sichtbar, die zu schwerwiegenden Sicherheitslücken führen. In diesem Paper entwickeln wir acht Design Features, die ein Marktplatz für Open Source haben sollte, um diese Probleme zu beseitigen. Wir begründen jedes Design Feature mit den bestehenden Praktiken von Open Source und stellen einen Prototypen vor. Abschließend diskutieren wir, welche Auswirkungen die Einführung eines solchen Marktplatzes haben könnte.

Translation: Marketplace to Coordinate and Finance Open Source Software …


Facepet: Enhancing Bystanders’ Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jason A. Mouloud, Scott Griffith Dec 2018

Facepet: Enhancing Bystanders’ Facial Privacy With Smart Wearables/Internet Of Things, Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jason A. Mouloud, Scott Griffith

Computer Science Faculty Publications

Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the …


Not So Many Non-Disjoint Translations, Andrzej Roslanowski, Vyacheslav V. Rykov Nov 2018

Not So Many Non-Disjoint Translations, Andrzej Roslanowski, Vyacheslav V. Rykov

Mathematics Faculty Publications

We show that, consistently, there is a Borel set which has uncountably many pairwise very non-disjoint translations, but does not allow a perfect set of such translations.


Visualization, Feature Selection, Machine Learning: Identifying The Responsible Group For Extreme Acts Of Violence, Mahdi Hashemi, Margeret A. Hall Nov 2018

Visualization, Feature Selection, Machine Learning: Identifying The Responsible Group For Extreme Acts Of Violence, Mahdi Hashemi, Margeret A. Hall

Interdisciplinary Informatics Faculty Publications

The toll of human casualties and psychological impacts on societies make any study on violent extremism worthwhile, let alone attempting to detect patterns among them. This paper is an effort to predict which violent extremist organization (VEO), among 14 currently active ones throughout the world, is responsible for a violent act based on 14 features, including its human and structural tolls, its target type and value, intelligence, and weapons utilized in the attack. Three main steps in our paper include: 1) the visualization of the violent acts through linear and non-linear dimensionality reduction techniques; 2) sequential forward feature selection based …


Identification Of Biologically Essential Nodes Via Determinative Power In Logical Models Of Cellular Processes, Trevor Pentzien, Bhanwar L. Puniya, Tomáš Helikar, Mihaela Teodora Matache Aug 2018

Identification Of Biologically Essential Nodes Via Determinative Power In Logical Models Of Cellular Processes, Trevor Pentzien, Bhanwar L. Puniya, Tomáš Helikar, Mihaela Teodora Matache

Mathematics Faculty Publications

A variety of biological networks can bemodeled as logical or Boolean networks. However, a simplification of the reality to binary states of the nodes does not ease the difficulty of analyzing the dynamics of large, complex networks, such as signal transduction networks, due to the exponential dependence of the state space on the number of nodes. This paper considers a recently introduced method for finding a fairly small subnetwork, representing a collection of nodes that determine the states of most other nodes with a reasonable level of entropy. The subnetwork contains the most determinative nodes that yield the highest information …


The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr. Aug 2018

The Influence Of Conversational Agent Embodiment And Conversational Relevance On Socially Desirable Responding, Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in a wide range of information systems. A great deal of research to date has focused on enhancing traits that make CAs more humanlike. However, few studies have examined the influence such traits have on information disclosure. This research builds on self-disclosure, social desirability, and social presence theories to explain how CA anthropomorphism affects disclosure of personally sensitive information. Taken together, these theories suggest that as CAs become more humanlike, the social desirability of user responses will increase. In this study, we use a laboratory experiment to examine the influence of …


Move-Hf: An Internet-Based Pilot Study To Improve Adherence To Exercise In Patients With Heart Failure, Pallav Deka, Bunny Pozehl, Mark A. Williams, Joseph F. Norman, Deepak Khazanchi, Dola Pathak Aug 2018

Move-Hf: An Internet-Based Pilot Study To Improve Adherence To Exercise In Patients With Heart Failure, Pallav Deka, Bunny Pozehl, Mark A. Williams, Joseph F. Norman, Deepak Khazanchi, Dola Pathak

Information Systems and Quantitative Analysis Faculty Publications

Aim: The use of the internet and newer activity monitors such as the Fitbit Charge HR to improve exercise adherence is limited. The primary aim of the Move on Virtual Engagement (MOVE-HF) was to investigate the effects of group social support by internet-based synchronized face-to-face video and objective physical activity feedback on adherence to recommended exercise guidelines.

Methods: Thirty stable heart failure patients (New York Heart Association class I–III), aged 64.7±11.5 years, were randomly assigned to an experimental or comparison group. Participants were provided a handout on self-care in heart failure, an exercise routine, a Fitbit Charge HR and were …


Exposing The Science In Citizen Science: Fitness To Purpose And Intentional Design, Julia K. Parrish, Hillary Burgess, Jale F. Weltzin, Lucy Fortson, Andrea Wiggins, Brooke Simmons Jul 2018

Exposing The Science In Citizen Science: Fitness To Purpose And Intentional Design, Julia K. Parrish, Hillary Burgess, Jale F. Weltzin, Lucy Fortson, Andrea Wiggins, Brooke Simmons

Information Systems and Quantitative Analysis Faculty Publications

Citizen science is a growing phenomenon. With millions of people involved and billions of in-kind dollars contributed annually, this broad extent, fine grain approach to data collection should be garnering enthusiastic support in the mainstream science and higher education communities. However, many academic researchers demonstrate distinct biases against the use of citizen science as a source of rigorous information. To engage the public in scientific research, and the research community in the practice of citizen science, a mutual understanding is needed of accepted quality standards in science, and the corresponding specifics of project design and implementation when working with a …


Two Critical Positions In Zinc Finger Domains Are Heavily Mutated In Three Human Cancer Types, Daniel Munro, Dario Ghersi, Mona Singh Jun 2018

Two Critical Positions In Zinc Finger Domains Are Heavily Mutated In Three Human Cancer Types, Daniel Munro, Dario Ghersi, Mona Singh

Interdisciplinary Informatics Faculty Publications

A major goal of cancer genomics is to identify somatic mutations that play a role in tumor initiation or progression. Somatic mutations within transcription factors are of particular interest, as gene expression dysregulation is widespread in cancers. The substantial gene expression variation evident across tumors suggests that numerous regulatory factors are likely to be involved and that somatic mutations within them may not occur at high frequencies across patient cohorts, thereby complicating efforts to uncover which ones are cancerrelevant. Here we analyze somatic mutations within the largest family of human transcription factors, namely those that bind DNA via Cys2His2 zinc …


Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle Jun 2018

Patient Preferences For Authentication And Security: A Comparison Study Of Younger And Older Patients, Ann Fruhling, Devika Ramachandran, Tamara Bernard, Ryan Schuetzler, John R. Windle

Interdisciplinary Informatics Faculty Publications

We examine authentication and security preferences of younger versus older patients in the healthcare domain. Previous research has investigated users' perception of the acceptability of various forms of authentication in nonhealthcare domains, but not patients’ preferences. First, we developed an interactive prototype to test three authentication methods: passwords, pattern, and voice. Our results indicate that younger patients prefer passwords by a significant margin. Older patients indicated more mixed preferences. In addition, we evaluated the level of security patients desired for protection of health information compared to financial information. We found no difference based on age: both groups felt financial security …


Design And Evaluation Of A Privacy Architecture For Crowdsensing Applications, Alfredo J. Perez, Sherali Zeadally Apr 2018

Design And Evaluation Of A Privacy Architecture For Crowdsensing Applications, Alfredo J. Perez, Sherali Zeadally

Computer Science Faculty Publications

By using consumer devices such as cellphones, wearables and Internet of Things devices owned by citizens, crowdsensing systems are providing solutions to the community in areas such as transportation, security, entertainment and the environment through the collection of various types of sensor data. Privacy is a major issue in these systems because the data collected can potentially reveal aspects considered private by the contributors of data. We propose the Privacy-Enabled ARchitecture (PEAR), a layered architecture aimed at protecting privacy in privacy-aware crowdsensing systems. We identify and describe the layers of the architecture. We propose and evaluate the design of MetroTrack, …


Security And Privacy In Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur Apr 2018

Security And Privacy In Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur

Computer Science Faculty Publications

The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.


Feasibility Of Using The Fitbit Charge Hr In Validating Self-Reported Exercise Diaries In A Community Setting In Patients With Heart Failure, Pallav Deka, Bunny Pozehl, Joseph F. Norman, Deepak Khazanchi Mar 2018

Feasibility Of Using The Fitbit Charge Hr In Validating Self-Reported Exercise Diaries In A Community Setting In Patients With Heart Failure, Pallav Deka, Bunny Pozehl, Joseph F. Norman, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Background: Use of wrist-worn activity monitors has increased over the past few years; however, the use of the Fitbit® Charge HR (FCHR) in a community setting in patients with heart failure has not been tested.

Purpose: The purpose of the study was to assess the feasibility, practicality and acceptability of utilizing the FCHR to validate self-reported exercise diaries and monitor exercise in community dwelling patients with heart failure. Methods: Thirty heart failure patients (12 females and 18 males) aged 64.7 ± 11.5 years were provided with a FCHR. Participants were provided with an exercise routine and for eight weeks, recorded …


The Role Of Ehealth In Disasters: A Strategy For Education, Training And Integration In Disaster Medicine, Anthony C. Norris, Jose J. Gonzalez, David T. Parry, Richard E. Scott, Julie Dugdale, Deepak Khazanchi Mar 2018

The Role Of Ehealth In Disasters: A Strategy For Education, Training And Integration In Disaster Medicine, Anthony C. Norris, Jose J. Gonzalez, David T. Parry, Richard E. Scott, Julie Dugdale, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

This paper describes the origins and progress of an international project to advance disaster eHealth (DEH) – the application of eHealth technologies to enhance the delivery of healthcare in disasters. The study to date has focused on two major themes; the role of DEH in facilitating inter-agency communication in disaster situations, and the fundamental need to promote awareness of DEH in the education of disaster managers and health professionals. The paper deals mainly with on-going research on the second of these themes, surveying the current provision of disaster medicine education, the design considerations for a DEH programme for health professionals, …


Explaining Social Recommendations To Casual Users: Design Principles And Opportunities, Chun-Hua Tsai, Peter Brusilovsky Mar 2018

Explaining Social Recommendations To Casual Users: Design Principles And Opportunities, Chun-Hua Tsai, Peter Brusilovsky

Information Systems and Quantitative Analysis Faculty Proceedings & Presentations

Recommender systems have become popular in recent years, and ordinary users are more likely to rely on such service when completing various daily tasks. The need to design and build explainable recommender interfaces is increasing rapidly. Most of the designs of such explanations are intended to reflect the underlying algorithms by which the recommendations are computed. These approaches have been shown to be useful for obtaining system transparency and trust. However, little is known about how to design explanation interfaces for causal (non-expert) users to achieve different explanatory goals. As a first step toward understanding the user interface design factors, …


Https://Onlinelibrary.Wiley.Com/Doi/10.1002/Spy2.15#:~:Text=A%20review%20and%20an%20empirical%20analysis%20of%20privacy%20policy%20and%20notices%20for%20consumer%20internet%20of%20things, Alfredo J. Perez, Sherali Zeadally, Jonathan Cochran Mar 2018

Https://Onlinelibrary.Wiley.Com/Doi/10.1002/Spy2.15#:~:Text=A%20review%20and%20an%20empirical%20analysis%20of%20privacy%20policy%20and%20notices%20for%20consumer%20internet%20of%20things, Alfredo J. Perez, Sherali Zeadally, Jonathan Cochran

Computer Science Faculty Publications

The privacy policies and practices of six consumer Internet of things (IoT) devices were reviewed and compared. In addition, an empirical verification of the compliance of privacy policies for data collection practices on two voice-activated intelligent assistant devices, namely the Amazon Echo Dot and Google Home devices was performed. The review shows that IoT privacy policies may not be usable from the human-computer interaction perspective because IoT policies are included as part of the manufacturers' general privacy policy (which may include policies unrelated to the device), or the IoT policy requires to read (in addition to the IoT policies) the …


Efficacy Of Multimedia Learning Modules As Preparation For Lecture-Based Tutorials In Electromagnetism, James Christopher Moore Feb 2018

Efficacy Of Multimedia Learning Modules As Preparation For Lecture-Based Tutorials In Electromagnetism, James Christopher Moore

Physics Faculty Publications

We have investigated the efficacy of on-line, multimedia learning modules (MLMs) as preparation for in-class, lecture-based tutorials in electromagnetism in a physics course for natural science majors (biology and marine science). Specifically, we report the results of a multiple-group pre/post-test research design comparing two groups receiving different treatments with respect to activities preceding participation in Tutorials in Introductory Physics. The different pre-tutorial activities were as follows: (1) students were assigned reading from a traditional textbook, followed by a traditional lecture; and (2) students completed on-line MLMs developed by the Physics Education Research Group at the University of Illinois at Urbana …


Genuine Faculty-Mentored Research Experiences For In-Service Science Teachers: Increases In Science Knowledge, Perception, And Confidence Levels, Christine E. Cutucache, Heather D. Leas, Neal F. Grandgenett, Kari L. Nelson, Steven N. Rodie, Robert Duncan Shuster, Chris Schaben, William E. Tapprich Jan 2018

Genuine Faculty-Mentored Research Experiences For In-Service Science Teachers: Increases In Science Knowledge, Perception, And Confidence Levels, Christine E. Cutucache, Heather D. Leas, Neal F. Grandgenett, Kari L. Nelson, Steven N. Rodie, Robert Duncan Shuster, Chris Schaben, William E. Tapprich

Biology Faculty Publications

The overall purpose of this multifocused study was to explore how participation in genuine mentored scientific research experiences impacts in-service science teachers and the knowledge and skills needed for their own science teaching. The research experiences resulted from a partnership between the University of Nebraska at Omaha and the Omaha Public School District. This Teacher- Researcher Partnership Program facilitated opportunities in inquiry, science content, interaction with laboratory instrumentation and technologies, critical discussion of literature, and dissemination of findings for participating in-service science teacher professional development utilizing an inquiry-based theoretical framework wherein we examined science teacher preparation via inquiry-based methods in …


University Of Nebraska At Omaha 2018-2019 Course Catalog, University Of Nebraska At Omaha Jan 2018

University Of Nebraska At Omaha 2018-2019 Course Catalog, University Of Nebraska At Omaha

Undergraduate Catalogs

Located in one of America’s best cities to live, work and learn, the University of Nebraska at Omaha (UNO) is Nebraska’s premier metropolitan university. With more than 15,000 students enrolled in 200-plus programs of study, UNO is recognized nationally for its online education, graduate education, military friendliness, and community engagement efforts.Founded in 1908, UNO has served learners of all backgrounds for more than 100 years and is dedicated to another century of excellence both in the classroom and in the community.


Open Data Standards For Open Source Software Risk Management Routines: An Examination Of Spdx, Robin A. Gandhi, Matt Germonprez, Georg J.P. Link Jan 2018

Open Data Standards For Open Source Software Risk Management Routines: An Examination Of Spdx, Robin A. Gandhi, Matt Germonprez, Georg J.P. Link

Information Systems and Quantitative Analysis Faculty Publications

As the organizational use of open source software (OSS) increases, it requires the adjustment of organizational routines to manage new OSS risk. These routines may be influenced by community-developed open data standards to explicate, analyze, and report OSS risks. Open data standards are co-created in open communities for unifying the exchange of information. The SPDX® specification is such an open data standard to explicate and share OSS risk information. The development and subsequent adoption of SPDX raises the questions of how organizations make sense of SPDX when improving their own risk management routines, and of how a community benefits from …


The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr. Jan 2018

The Influence Of Conversational Agents On Socially Desirable Responding, Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Jay F. Nunamaker Jr.

Information Systems and Quantitative Analysis Faculty Publications

Conversational agents (CAs) are becoming an increasingly common component in many information systems. The ubiquity of CAs in cell phones, entertainment systems, and messaging applications has led to a growing need to understand how design choices made when developing CAs influence user interactions. In this study, we explore the use case of CAs that gather potentially sensitive information from people—for example, in a medical interview. Using a laboratory experiment, we examine the influence of CA responsiveness and embodiment on the answers people give in response to sensitive and non-sensitive questions. The results show that for sensitive questions, the responsiveness of …


Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja Jan 2018

Regression Analysis Of Open Source Project Impact: Relationships With Activity And Rewards, Vinod Kumar Ahuja

Information Systems and Quantitative Analysis Faculty Publications

Engagement with open source projects is becoming an increasingly important part of how people work. In this regard, there is a growing interest in how we can better understand the dynamics within an open source project related to project activity, project contributor rewards, and project impact. In this paper, we summarize our work of exploring the relationships between these items.


Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins Jan 2018

Eight Observations And 24 Research Questions About Open Source Projects: Illuminating New Realities, Matt Germonprez, Georg J.P. Link, Kevin Lumbard, Sean Goggins

Information Systems and Quantitative Analysis Faculty Publications

The rapid acceleration of corporate engagement with open source projects is drawing out new ways for CSCW researchers to consider the dynamics of these projects. Research must now consider the complex ecosystems within which open source projects are situated, including issues of for-profit motivations, brokering foundations, and corporate collaboration. Localized project considerations cannot reveal broader workings of an open source ecosystem, yet much empirical work is constrained to a local context. In response, we present eight observations from our eight-year engaged field study about the changing nature of open source projects. We ground these observations through 24 research questions that …


Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi Jan 2018

Exploring The Impact Of Technology Capabilities On Trust In Virtual Teams, Deepak Khazanchi

Information Systems and Quantitative Analysis Faculty Publications

Purpose – In an environment of constant technological change, the use of virtual teams has become commonplace for many organizations. Virtual teams (VTs) bring together dispersed individuals with varying knowledge and skill sets to accomplish tasks. VTs rely heavily on information technology as the medium for communication and coordination of work. The issue of establishing and maintaining trust in VTs poses challenges for these dispersed workers. Previous research has established that higher trusting teams have better cooperation and experience improved outcomes. We hope to contribute to the literature on trust in VTs by exploring how technology can facilitate high trusting …


Knowing And Designing: Understanding Information Use In Open Source Design Through The Lens Of Information Archetypes, Kevin Lumbard, Ammar Abid, Christine Toh, Matt Germonprez Jan 2018

Knowing And Designing: Understanding Information Use In Open Source Design Through The Lens Of Information Archetypes, Kevin Lumbard, Ammar Abid, Christine Toh, Matt Germonprez

Interdisciplinary Informatics Faculty Proceedings & Presentations

The early phases of the product design process are crucial to the success of design outcomes. While information utilized during idea development has tremendous potential to impact the final design, there is a lack of understanding about the types of information utilized in industry, making it challenging to develop and teach methodologies that support the design of competitive products. As a first step in understanding this process, this study focuses on developing a framework of Information Archetypes utilized by designers in industry. This was accomplished through in-depth analysis of qualitative interviews with large software engineering companies. The results reveal two …


Structural Identification And Kinetic Analysis Of The In Vitro Products Formed By Reaction Of Bisphenol A‑3,4-Quinone With N‑Acetylcysteine And Glutathione, Douglas E. Stack, John A. Conrad, Bejan Mahmud Jan 2018

Structural Identification And Kinetic Analysis Of The In Vitro Products Formed By Reaction Of Bisphenol A‑3,4-Quinone With N‑Acetylcysteine And Glutathione, Douglas E. Stack, John A. Conrad, Bejan Mahmud

Chemistry Faculty Publications

Bisphenol A (BPA) has received considerable attention as an endocrine disrupting chemical and a possible substrate for genotoxic metabolites. BPA metabolism leads to formation of electrophilic o-quinones cable of binding to DNA and other endogenous nucleophiles. We have structurally identified the products resulting from the reaction of bisphenol A-3,4-quinone (BPAQ) with N-acetylcysteine (NAC) and glutathione (GSH). The major and minor isomers are both the result of 1,6-conjugate addition and are produced almost instantly in high yield. Reactions using 1.3 equiv of GSH showed the presence of a bis-glutathionyl adduct which was not observed using higher GSH concentration relative to BPAQ. …


Prediction Of Novel Anti-Ebola Virus Compounds Utilizing Artificial Neural Network (Ann), Ronald Bartzatt Jan 2018

Prediction Of Novel Anti-Ebola Virus Compounds Utilizing Artificial Neural Network (Ann), Ronald Bartzatt

Chemistry Faculty Publications

Artificial Neural Network (ANN) analysis is shown to predict the molecular properties of new anti-EBOLA compounds following training/learning by use of 60 previously known and studied drugs. Following training/learning by applying properties of 60 known drugs the TIBERIUS ANN system can efficiently predict the molecular properties of comparable new drugs. Molecular weight (MW) is an important and dominant property of perspective drugs considered for clinical trials. TIBERIUS ANN was able to predict comparable values of MW for drugs following training cycles. One-way ANOVA, F and T tests indicate that actual and predicted MW have the same means (P=.99). Passing-Bablok regression …