Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Active Bundles For Protecting Confidentiality Of Sensitive Data Throughout Their Lifecycle, Lotfi Ben Othmane Dec 2010

Active Bundles For Protecting Confidentiality Of Sensitive Data Throughout Their Lifecycle, Lotfi Ben Othmane

Dissertations

Protecting confidentiality of shared sensitive data requires satisfying conflicting needs for disseminating data and preventing unauthorized data disclosures. We propose a solution named the active bundles scheme for protecting sensitive data from their disclosures to unauthorized parties during their dissemination. The scheme protects data throughout their entire lifecycle, from data creation through their dissemination to their evaporation or apoptosis (a partial or complete self-destruction, respectively).

An active bundle packages together sensitive data, metadata, and a virtual machine (VM) specific to the bundle. Metadata contain information related to the use of data, including data access control and dissemination policies. A VM …


Stereo Matching Using A Modified Efficient Belief Propagation In A Level Set Framework, Stephen Goyer Rogers Dec 2010

Stereo Matching Using A Modified Efficient Belief Propagation In A Level Set Framework, Stephen Goyer Rogers

Dissertations

Stereo matching determines correspondence between pixels in two or more images of the same scene taken from different angles; this can be handled either locally or globally. The two most common global approaches are belief propagation (BP) and graph cuts.

Efficient belief propagation (EBP), which is the most widely used BP approach, uses a multi-scale message passing strategy, an O(k) smoothness cost algorithm, and a bipartite message passing strategy to speed up the convergence of the standard BP approach. As in standard belief propagation, every pixel sends messages to and receives messages from its four neighboring pixels in EBP. Each …


Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba Sep 2010

Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba

Dissertations

The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.

Although, the adoption …


Natural Selection On Mrna Secondary Structure And Its Correlation With Protein Functional Groups, Suresh Solaimuthu Aug 2010

Natural Selection On Mrna Secondary Structure And Its Correlation With Protein Functional Groups, Suresh Solaimuthu

Dissertations

Natural selection may occur at multiple levels of the biological hierarchy, including at the molecular level. It may occur on any phenotypic trait that evidences variation and that is heritable. This research uses computational methods to investigate whether the stability of the secondary structures of mRNAs has been the subject of natural selection.

The DNA sequence that codes for a particular target protein is only partially determined by that protein, since the redundancy of the genetic code permits multiple possible synonymous codons for each peptide. An RNA transcript of a DNA protein template (gene) folds back on itself through complementary …


Dnagents: Genetically Engineered Intelligent Mobile Agents, Jeremy Otho Kackley Aug 2010

Dnagents: Genetically Engineered Intelligent Mobile Agents, Jeremy Otho Kackley

Dissertations

Mobile agents are a useful paradigm for network coding providing many advantages and disadvantages. Unfortunately, widespread adoption of mobile agents has been hampered by the disadvantages, which could be said to outweigh the advantages. There is a variety of ongoing work to address these issues, and this is discussed. Ultimately, genetic algorithms are selected as the most interesting potential avenue. Genetic algorithms have many potential benefits for mobile agents. The primary benefit is the potential for agents to become even more adaptive to situational changes in the environment and/or emergent security risks. There are secondary benefits such as the natural …


Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu May 2010

Variance Reduction Techniques For Estimating Quantiles And Value-At-Risk, Fang Chu

Dissertations

Quantiles, as a performance measure, arise in many practical contexts. In finance, quantiles are called values-at-risk (VARs), and they are widely used in the financial industry to measure portfolio risk. When the cumulative distribution function is unknown, the quantile can not be computed exactly and must be estimated. In addition to computing a point estimate for the quantile, it is important to also provide a confidence interval for the quantile as a way of indicating the error in the estimate. A problem with crude Monte Carlo is that the resulting confidence interval may be large, which is often the case …


New Data Structures, Models, And Algorithms For Real-Time Resource Management, Xinfa Hu May 2010

New Data Structures, Models, And Algorithms For Real-Time Resource Management, Xinfa Hu

Dissertations

Real-time resource management is the core and critical task in real-time systems. This dissertation explores new data structures, models, and algorithms for real-time resource management.

At first, novel data structures, i.e., a class of Testing Interval Trees (TITs), are proposed to help build efficient scheduling modules in real-time systems. With a general data structure, i.e., the TIT* tree, the average costs of the schedulability tests in a wide variety of real-time systems can be reduced. With the Testing Interval Tree for Vacancy analysis (TIT-V), the complexities of the schedulability tests in a class of parallel/distributed real-time systems can be effectively …


Guppie: A Coordination Framework For Parallel Processing Using Shared Memory Featuring A Master-Worker Relationship, Sean Christopher Mccarthy May 2010

Guppie: A Coordination Framework For Parallel Processing Using Shared Memory Featuring A Master-Worker Relationship, Sean Christopher Mccarthy

Dissertations

Most programs can be parallelized to some extent. The processing power available in computers today makes parallel computing more desirable and attainable than ever before. Many machines today have multiple processors or multiple processing cores making parallel computing more available locally, as well as over a network. In order for parallel applications to be written, they require a computing language, such as C++, and a coordination language (or library), such as Linda. This research involves the creation and implementation of a coordination framework, Guppie, which is easy to use, similar to Linda, but provides more efficiency when dealing with large …


Algorithms In Comparative Genomics, Satish Chikkagoudar Jan 2010

Algorithms In Comparative Genomics, Satish Chikkagoudar

Dissertations

The field of comparative genomics is abundant with problems of interest to computer scientists. In this thesis, the author presents solutions to three contemporary problems: obtaining better alignments for phylogeny reconstruction, identifying related RNA sequences in genomes, and ranking Single Nucleotide Polymorphisms (SNPs) in genome-wide association studies (GWAS).

Sequence alignment is a basic and widely used task in bioinformatics. Its applications include identifying protein structure, RNAs and transcription factor binding sites in genomes, and phylogeny reconstruction. Phylogenetic descriptions depend not only on the employed reconstruction technique, but also on the underlying sequence alignment. The author has studied and established a …


Understanding Cognitive Differences In Processing Competing Visualizations Of Complex Systems, Madhavi Mukul Chakrabarty Jan 2010

Understanding Cognitive Differences In Processing Competing Visualizations Of Complex Systems, Madhavi Mukul Chakrabarty

Dissertations

Node-link diagrams are used represent systems having different elements and relationships among the elements. Representing the systems using visualizations like node-link diagrams provides cognitive aid to individuals in understanding the system and effectively managing these systems. Using appropriate visual tools aids in task completion by reducing the cognitive load of individuals in understanding the problems and solving them. However, the visualizations that are currently developed lack any cognitive processing based evaluation. Most of the evaluations (if any) are based on the result of tasks performed using these visualizations. Therefore, the evaluations do not provide any perspective from the point of …


Job Seeking And Job Application In Social Networking Sites : Predicting Job Seekers' Behavioral Intentions, Maria Marcella Plummer Jan 2010

Job Seeking And Job Application In Social Networking Sites : Predicting Job Seekers' Behavioral Intentions, Maria Marcella Plummer

Dissertations

Social networking sites (SNSs) are revolutionizing the way in which employers and job seekers connect and interact with each other. Despite the reported benefits of SNSs with respect to finding a job, there are issues such as privacy concerns that might be deterring job seekers from using these sites in their attempts to secure a job. It is therefore important to understand the factors that are salient in predicting job seekers' use of SNSs in applying for jobs.

In this research, a theoretical model was developed to explicate job seekers' intentions to use SNSs to apply for jobs. Two aspects …


Semantics And Efficient Evaluation Of Partial Tree-Pattern Queries On Xml, Xiaoying Wu Jan 2010

Semantics And Efficient Evaluation Of Partial Tree-Pattern Queries On Xml, Xiaoying Wu

Dissertations

Current applications export and exchange XML data on the web. Usually, XML data are queried using keyword queries or using the standard structured query language XQuery the core of which consists of the navigational query language XPath. In this context, one major challenge is the querying of the data when the structure of the data sources is complex or not fully known to the user. Another challenge is the integration of multiple data sources that export data with structural differences and irregularities. In this dissertation, a query language for XML called Partial Tree-Pattern Query (PTPQ) language is considered. PTPQs generalize …


Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul Jan 2010

Virtual World Commerce Adoption (Vwca) : A Case Study Of Second Life Investigating The Impacts Of Perceived Affordances, Trust, And Need Satisfaction, Kamolbhan Olapiriyakul

Dissertations

Virtual worlds are computer-simulated worlds in which multi-players can simultaneously interact in a rich graphical environment. The development of virtual worlds, along with the massive growth of users, creates opportunities for business organizations. This dissertation involves many studies regarding virtual world adoption in business by virtual consumers.

Most of the research in Information Systems (IS) was conducted investigating factors influencing technology adoption, such as ease of use and usefulness, subjective norms and behavioral controls, self-efficacy, performance and effort expectancy, flow, etc. However, most of these research studies focused neither on design aspects related to affordances nor users' goal-oriented behaviors, such …


A Comparison Of Computer-Based Training And Traditional Classroom Training For The Sad Corporation Job Placement Team, Janice Brown Adams Jan 2010

A Comparison Of Computer-Based Training And Traditional Classroom Training For The Sad Corporation Job Placement Team, Janice Brown Adams

Dissertations

Purpose: The purpose of this research study was to compare the effectiveness of computer-based training with traditional classroom training; both instructional delivery methods utilized the traditional classroom curriculum as a means of delivery for an on-the-job company-sponsored program. The JAW-SAD Human Resource Center (HRC) is a training facility for the SAD Corporation, a major international manufacturing company. The HRC is responsible for conducting continuous training and certification of SAD employees. Historically, training has been provided through conference workshops with a traditional classroom training format. The motivation and importance for this study was influenced by an administrative requirement to determine the …