Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Walden University (47)
- Singapore Management University (7)
- Nova Southeastern University (4)
- University of South Florida (4)
- California Polytechnic State University, San Luis Obispo (3)
-
- Dakota State University (3)
- Louisiana State University (3)
- New Jersey Institute of Technology (3)
- University of Wisconsin Milwaukee (3)
- Air Force Institute of Technology (2)
- Eastern Washington University (2)
- The University of Akron (2)
- The University of Maine (2)
- University of Nebraska at Omaha (2)
- Boise State University (1)
- Missouri University of Science and Technology (1)
- Montana Tech Library (1)
- San Jose State University (1)
- University of Lynchburg (1)
- University of Massachusetts Amherst (1)
- University of Missouri, St. Louis (1)
- University of Nebraska Medical Center (1)
- University of New Mexico (1)
- University of North Florida (1)
- University of Southern Maine (1)
- University of Texas at El Paso (1)
- Virginia Commonwealth University (1)
- Western University (1)
- Keyword
-
- Leadership (5)
- Project Management (5)
- Information Technology (4)
- Information technology (4)
- Data Mining (3)
-
- Healthcare (3)
- Innovation (3)
- Machine learning (3)
- Management (3)
- Social Media (3)
- Strategies (3)
- Text mining (3)
- Agile (2)
- Big data (2)
- Cloud computing (2)
- Clustering (2)
- Coding (2)
- Database (2)
- Development (2)
- Disaster (2)
- Insurance (2)
- Software (2)
- Software Development (2)
- TAM (2)
- Text Mining (2)
- Turnover (2)
- ACA (1)
- API recommendation (1)
- ATM (1)
- Academic -- UNF -- Computing; gate; automate; ciri; f-measure; human rights; u.s. department of state (1)
- Publication
-
- Walden Dissertations and Doctoral Studies (47)
- Dissertations and Theses Collection (Open Access) (7)
- Theses and Dissertations (6)
- CCE Theses and Dissertations (4)
- USF Tampa Graduate Theses and Dissertations (4)
-
- Dissertations (3)
- Masters Theses & Doctoral Dissertations (3)
- Computer Engineering (2)
- EWU Masters Thesis Collection (2)
- Electronic Theses and Dissertations (2)
- LSU Master's Theses (2)
- Theses/Capstones/Creative Projects (2)
- Williams Honors College, Honors Research Projects (2)
- Boise State University Theses and Dissertations (1)
- Capstone Experience (1)
- Computer Science ETDs (1)
- Computer Science and Software Engineering (1)
- Doctoral Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate Theses & Non-Theses (1)
- LSU Doctoral Dissertations (1)
- Master's Projects (1)
- Masters Theses (1)
- Open Access Theses & Dissertations (1)
- Theses (1)
- Thinking Matters Symposium Archive (1)
- UNF Graduate Theses and Dissertations (1)
- Undergraduate Theses and Capstone Projects (1)
Articles 1 - 30 of 101
Full-Text Articles in Physical Sciences and Mathematics
Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker
Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker
Dissertations
Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.
This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …
Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan
Predicting Post-Procedural Complications Using Neural Networks On Mimic-Iii Data, Namratha Mohan
LSU Master's Theses
The primary focus of this paper is the creation of a Machine Learning based algorithm for the analysis of large health based data sets. Our input was extracted from MIMIC-III, a large Health Record database of more than 40,000 patients. The main question was to predict if a patient will have complications during certain specified procedures performed in the hospital. These events are denoted by the icd9 code 996 in the individuals' health record. The output of our predictive model is a binary variable which outputs the value 1 if the patient is diagnosed with the specific complication or 0 …
Secured Data Masking Framework And Technique For Preserving Privacy In A Business Intelligence Analytics Platform, Osama Ali
Electronic Thesis and Dissertation Repository
The main concept behind business intelligence (BI) is how to use integrated data across different business systems within an enterprise to make strategic decisions. It is difficult to map internal and external BI’s users to subsets of the enterprise’s data warehouse (DW), resulting that protecting the privacy of this data while maintaining its utility is a challenging task. Today, such DW systems constitute one of the most serious privacy breach threats that an enterprise might face when many internal users of different security levels have access to BI components. This thesis proposes a data masking framework (iMaskU: Identify, Map, Apply, …
Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen
Gradubique: An Academic Transcript Database Using Blockchain Architecture, Thinh Nguyen
Master's Projects
Blockchain has been widely adopted in the last few years even though it is in its infancy. The first well-known application built on blockchain technology was Bitcoin, which is a decentralized and distributed ledger to record crypto-currency transactions. All of the transactions in Bitcoin are anonymously transferred and validated by participants in the network. Bitcoin protocol and its operations are so reliable that technologists have been inspired to enhance blockchain technologies and deploy it outside of the crypto-currency world. The demand for private and non-crypto-currency solutions have surged among consortiums because of the security and fault tolerant features of blockchain. …
Phr: Patient Health Record, Quinn Nelson
Phr: Patient Health Record, Quinn Nelson
Theses/Capstones/Creative Projects
The rapid development of information technology systems has expanded into multiple disciplines and results in systems that are limited by initial design and implementation: the Healthcare Information Technology (HIT) space is no different. The introduction of the Electronic Health Record (EHR) system has changed the way healthcare operates. Initial designs of these systems were focused on serving the needs of insurance companies and healthcare billing departments. Research shows that the design of EHR systems negatively impact provider-patient interactions and the care they receive. This capstone project capitalizes on the collaboration efforts between UNO and UNMC – by joining a research …
Eye Pressure Monitior, Andrea Nella Levy
Eye Pressure Monitior, Andrea Nella Levy
Computer Engineering
The document describes a mobile application that takes information from an attached device which tests eye pressure. The device consists of an IOIO board connected to a custom device that measures the frequency of a given waveform. The device was designed by another student for their senior project, which I am taking over. This device is connected to an IOIO board which is a board designed by a Google employee which works with an android phone in order to create applications that work with embedded systems. The board comes with an API and connects to the phone via a micro-USB. …
Comparison Mining From Text, Maksim Tkachenko
Comparison Mining From Text, Maksim Tkachenko
Dissertations and Theses Collection (Open Access)
Online product reviews are important factors of consumers' purchase decisions. They invade more and more spheres of our life, we have reviews on books, electronics, groceries, entertainments, restaurants, travel experiences, etc. More than 90 percent of consumers read online reviews before they purchase products as reported by various consumers surveys. This observation suggests that product review information enhances consumer experience and helps them to make better-informed purchase decisions. There is an enormous amount of online reviews posted on e-commerce platforms, such as Amazon, Apple, Yelp, TripAdvisor. They vary in information and may be written with different experiences and preferences.
If …
Improving Strategic It Investment Decisions By Reducing Information Asymmetry, Thomas P. Stablein
Improving Strategic It Investment Decisions By Reducing Information Asymmetry, Thomas P. Stablein
USF Tampa Graduate Theses and Dissertations
The unprecedented ubiquity with which technological advancements, such as blockchain, the Internet of things (IoT), big data, machine learning, and artificial intelligence (AI), are impacting the world has forced large organizations to rethink their information technology roadmaps. Their decisions about how they invest in technology have become more important. It is against this backdrop that companies must decide how much to invest in their aging technologies versus these new potentially transformational ones. A decision is only as good as the information available to the decision-makers when they make it. This research project seeks to understand the effects that information asymmetry …
Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.
Enhancing The Design Of A Cybersecurity Risk Management Solution For Communities Of Trust, James E. Fulford Jr.
USF Tampa Graduate Theses and Dissertations
Research into cybersecurity risks and various methods of evaluating those threats has become an increasingly important area of academic and practitioner investigations. Of particular interest in this field is enhancing the designs and informing capabilities of cybersecurity risk management solutions for users who desire to understand how organizations are impacted when such risks are exploited. Many of the cybersecurity risk management solutions are extremely technical and require their users to have a commensurate level of technical acumen. In the situation evaluated during this research project, the founders of the company being researched had created a highly technical risk management solution …
Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur
Effective Visualization Approaches For Ultra-High Dimensional Datasets, Gurminder Kaur
LSU Doctoral Dissertations
Multivariate informational data, which are abstract as well as complex, are becoming increasingly common in many areas such as scientific, medical, social, business, and so on. Displaying and analyzing large amounts of multivariate data with more than three variables of different types is quite challenging. Visualization of such multivariate data suffers from a high degree of clutter when the numbers of dimensions/variables and data observations become too large. We propose multiple approaches to effectively visualize large datasets of ultrahigh number of dimensions by generalizing two standard multivariate visualization methods, namely star plot and parallel coordinates plot. We refine three variants …
A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle
A Methodology For Evaluating Relational And Nosql Databases For Small-Scale Storage And Retrieval, Ryan D. Engle
Theses and Dissertations
Modern systems record large quantities of electronic data capturing time-ordered events, system state information, and behavior. Subsequent analysis enables historic and current system status reporting, supports fault investigations, and may provide insight for emerging system trends. Unfortunately, the management of log data requires ever more efficient and complex storage tools to access, manipulate, and retrieve these records. Truly effective solutions also require a well-planned architecture supporting the needs of multiple stakeholders. Historically, database requirements were well-served by relational data models, however modern, non-relational databases, i.e. NoSQL, solutions, initially intended for “big data” distributed system may also provide value for smaller-scale …
Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani
Principles And Guidelines For Advancement Of Touchscreen-Based Non-Visual Access To 2d Spatial Information, Hari Prasath Palani
Electronic Theses and Dissertations
Graphical materials such as graphs and maps are often inaccessible to millions of blind and visually-impaired (BVI) people, which negatively impacts their educational prospects, ability to travel, and vocational opportunities. To address this longstanding issue, a three-phase research program was conducted that builds on and extends previous work establishing touchscreen-based haptic cuing as a viable alternative for conveying digital graphics to BVI users. Although promising, this approach poses unique challenges that can only be addressed by schematizing the underlying graphical information based on perceptual and spatio-cognitive characteristics pertinent to touchscreen-based haptic access. Towards this end, this dissertation empirically identified a …
Towards An Efficient, Scalable Stream Query Operator Framework For Representing And Analyzing Continuous Fields, John Whittier
Towards An Efficient, Scalable Stream Query Operator Framework For Representing And Analyzing Continuous Fields, John Whittier
Electronic Theses and Dissertations
Advancements in sensor technology have made it less expensive to deploy massive numbers of sensors to observe continuous geographic phenomena at high sample rates and stream live sensor observations. This fact has raised new challenges since sensor streams have pushed the limits of traditional geo-sensor data management technology. Data Stream Engines (DSEs) provide facilities for near real-time processing of streams, however, algorithms supporting representing and analyzing Spatio-Temporal (ST) phenomena are limited.
This dissertation investigates near real-time representation and analysis of continuous ST phenomena, observed by large numbers of mobile, asynchronously sampling sensors, using a DSE and proposes two novel stream …
Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi
Online Social Networks’ Investigations Of Individuals’ Healthy And Unhealthy Lifestyle Behaviors And Social Factors Influencing Them —Three Essays, Mahyar Sharif Vaghefi
Theses and Dissertations
More than half of U.S. adults suffer from one or more chronic diseases, which account for 86% of total U.S. healthcare costs. Major contributors to chronic diseases are unhealthy lifestyle behaviors, which include lack of physical activity, poor nutrition, tobacco use, and drinking too much alcohol. A reduction in the prevalence of health-risk behaviors could improve individuals’ longevity and quality of life and may halt the exponential growth of healthcare costs. Prior studies in the field have acknowledged that a comprehensive understanding of health behaviors requires the examination of individual’ behaviors in supra-dyadic social networks. In recent years, the growth …
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Fostering The Retrieval Of Suitable Web Resources In Response To Children's Educational Search Tasks, Oghenemaro Deborah Anuyah
Boise State University Theses and Dissertations
Children regularly turn to search engines (SEs) to locate school-related materials. Unfortunately, research has shown that when utilizing SEs, children do not always access resources that specifically target them. To support children, popular and child-oriented SEs make available a safe search filter, which is meant to eliminate inappropriate resources. Safe search is, however, not always the perfect deterrent as pornographic and hate-based resources may slip through the filter, while resources relevant to an educational search context may be misconstrued and filtered out. Moreover, filtering inappropriate resources in response to children searches is just one perspective to consider in offering them …
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
Capstone Experience
This research study was completed at Legal Aid of Nebraska’s Health, Education, and Law Project through the partnership it has formed working with Nebraska Medicine and Iowa Legal Aid. Traditionally, health and disease have always been viewed exclusively as "healthcare" issues. But with healthcare consistently growing towards holistic approaches to help patients, we now know there are deeper, structural conditions of society that can act as strong driving forces of a person's poor daily living conditions that can negatively impact health. The importance of a Medical-Legal Partnership is that it considers a patient's social determinants of health (SDHs). The goal …
Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal
Proactive And Reactive Resource/Task Allocation For Agent Teams In Uncertain Environments, Pritee Agrawal
Dissertations and Theses Collection (Open Access)
Synergistic interactions between task/resource allocation and multi-agent coordinated planning/assignment exist in many problem domains such as trans- portation and logistics, disaster rescue, security patrolling, sensor networks, power distribution networks, etc. These domains often feature dynamic environments where allocations of tasks/resources may have complex dependencies and agents may leave the team due to unforeseen conditions (e.g., emergency, accident or violation, damage to agent, reconfiguration of environment).
Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao
Secure Enforcement Of Isolation Policy On Multicore Platforms With Virtualization Techniques, Siqi Zhao
Dissertations and Theses Collection (Open Access)
A number of virtualization based systems have been proposed in the literature as an effective measure against the adversaries with the kernel privilege. However, under a systematic analysis, such systems exhibit vulnerabilities that can still be exploited by such an attacker with the kernel privilege. The fundamental reason is that there is an inherent incompatibility between the tamper-proof requirement and the complete mediation requirement of the reference monitor model. The incompatibility manifests in the virtualization based systems in the form of a discrepancy between the enforcement capability demanded by the high-level policy and the one achievable through the system design …
Analytics For Novel Consumer Insights (A Three Essay Dissertation), Utkarsh Shrivastava
Analytics For Novel Consumer Insights (A Three Essay Dissertation), Utkarsh Shrivastava
USF Tampa Graduate Theses and Dissertations
Both literature and practice have investigated how the vast amount of ever increasing customer information can inform marketing strategy and decision making. However, the customer data is often susceptible to modeling bias and misleading findings due to various factors including sample selection and unobservable variables. The available analytics toolkit has continued to develop but in the age of nearly perfect information, the customer decision making has also evolved. The dissertation addresses some of the challenges in deriving valid and useful consumer insights from customer data in the digital age. The first study addresses the limitations of traditional customer purchase measures …
Predicting River Stage Using Recurrent Neural Networks, Eric Rohli
Predicting River Stage Using Recurrent Neural Networks, Eric Rohli
LSU Master's Theses
River stage prediction is an important problem in the water transportation industry. Accurate river stage predictions provide crucial information to barge and tow boat operators, port terminal captains, and lock management officials. Shallow river levels caused by prolonged drought impact the loading capacity of barges and tow boats. High river levels caused by excessive rainfall or snowmelt allow for greater tow capacities but make downstream transportation and lock management risky. Current academic river height prediction systems utilize either time series statistical analysis or machine learning algorithms to forecast future river heights, but systems that combine these two areas often limit …
Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman
Is Information Systems Misuse Always Bad? A New Perspective On Is Misuse In Hospitals Under The Context Of Disasters, Dheyaaldin Alsalman
Masters Theses & Doctoral Dissertations
Although the extant literature has investigated how individuals engage in inappropriate behaviors based on the rational choice theory (RCT) (e.g., computer misconduct), the neutralization theory (e.g., IS security policies violation), and workarounds under normal situations, it has given little consideration to how individuals are involved in misuse of information systems with a good intention under the context of disasters. To fill this research gap, we propose a selfless misuse model, which offers a theoretical explanation for the concept of individuals’ selfless misuse intention under uncertainty caused by disasters. In this study, we show why employees make decisions to misuse the …
Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty
Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty
Masters Theses & Doctoral Dissertations
The online petition has become one of the most important channels of civic participation. Most of the state-of-the-art online platforms, however, tend to use simple indicators (such as popularity) to rank petitions, hence creating a situation where the most popular petitions dominate the rank and attract most people’s attention. For the petitions which focus on specific issues, they are often in a disadvantageous position on the list. For example, a petition for local environment problem may not be seen by many people who are really concerned with it, simply because it takes multiple pages to reach it. Therefore, the simple …
Context Recovery In Location-Based Social Networks, Wen Haw Chong
Context Recovery In Location-Based Social Networks, Wen Haw Chong
Dissertations and Theses Collection (Open Access)
This dissertation addresses context recovery in Location-Based Social Networks (LBSN), which are platforms where users post content from various locations. With this general LBSN definition, many existing social media platforms that support user-generated location relevant content using mobile devices could also qualify as LBSNs. Context recovery for such user posts refers to recovering the venue and the semantic contexts of these user posts. Such information is useful for user profiling and to support various applications such as venue recommendation and location- based advertising.
Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi
Mining Temporal Activity Patterns On Social Media, Nikan Chavoshi
Computer Science ETDs
Social media provide communication networks for their users to easily create and share content. Automated accounts, called bots, abuse these platforms by engaging in suspicious and/or illegal activities. Bots push spam content and participate in sponsored activities to expand their audience. The prevalence of bot accounts in social media can harm the usability of these platforms, and decrease the level of trustworthiness in them. The main goal of this dissertation is to show that temporal analysis facilitates detecting bots in social media. I introduce new bot detection techniques which exploit temporal information. Since automated accounts are controlled by computer programs, …
An Effectual Approach For The Development Of Novel Applications On Digital Platforms, Onkar Shamrao Malgonde
An Effectual Approach For The Development Of Novel Applications On Digital Platforms, Onkar Shamrao Malgonde
USF Tampa Graduate Theses and Dissertations
The development of novel software applications on digital platforms differs from traditional software development and provides unique challenges to the software development manager and team. Application producers must achieve application-platform match, application-market match, value propositions exceeding platform’s core value propositions, and novelty. These desired properties support a new vision of the software development team as entrepreneurs with a goal of developing novel applications on digital platforms. Digital platforms are characterized by an uncertain, risky, and resource-constrained environment, where existing approaches—plan-driven, ad-hoc, and controlled-flexible—have limited applicability. Building on the theoretical basis of the theory of effectuation from the entrepreneurship domain, this …
The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson
The Effect Of Endgame Tablebases On Modern Chess Engines, Christopher D. Peterson
Computer Engineering
Modern chess engines have the ability to augment their evaluation by using massive tables containing billions of positions and their memorized solutions. This report examines the importance of these tables to better understand the circumstances under which they should be used. The analysis conducted in this paper empirically examines differences in size and speed of memorized positions and their impacts on engine strength. Using this technique, situations where memorized tables improve play (and situations where they do not) are discovered.
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Deaddrop: Message Passing Without Metadata Leakage, Davis Mike Arndt
Computer Science and Software Engineering
Even when network data is encrypted, observers can make inferences about content based on collected metadata. DeadDrop is an exploratory API designed to protect the metadata of a conversation from both outside observers and the facilitating server. To do so, DeadDrop servers are passed no recipient address, instead relying upon the recipient to check for messages of their own volition. In addition, the recipient downloads a copy of every encrypted message on the server to prevent even the server from knowing to whom each message is intended. To these purposes, DeadDrop is mostly successful. However, it does not obscure all …
Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken
Virtual Smarts - Optimizing The Coalescing Of People For Collective Action Within Urban Communities, Stephen Thomas Ricken
Dissertations
Despite the importance of individuals coming together for social group-activities (e.g., pick-up volleyball), the process by which such groups coalesce is poorly understood, and as a consequence is poorly supported by technology. This is despite the emergence of Event-Based Social Network (EBSN) technologies that are specifically designed to assist group coalescing for social activities. Existing theories focus on group development in terms of norms and types, rather than the processes involved in initial group coalescence. This dissertation addresses this gap in the literature through four studies focusing on understanding the coalescing process for interest-based group activities within urban environments and …
Analysis Of 2016-17 Major League Soccer Season Data Using Poisson Regression With R, Ian D. Campbell
Analysis Of 2016-17 Major League Soccer Season Data Using Poisson Regression With R, Ian D. Campbell
Undergraduate Theses and Capstone Projects
To the outside observer, soccer is chaotic with no given pattern or scheme to follow, a random conglomeration of passes and shots that go on for 90 minutes. Yet, what if there was a pattern to the chaos, or a way to describe the events that occur in the game quantifiably. Sports statistics is a critical part of baseball and a variety of other of today’s sports, but we see very little statistics and data analysis done on soccer. Of this research, there has been looks into the effect of possession time on the outcome of a game, the difference …
Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi
Three Essays On Trust Mining In Online Social Networks, Gelareh Towhidi
Theses and Dissertations
This dissertation research consists of three essays on studying trust in online social networks. Trust plays a critical role in online social relationships, because of the high levels of risk and uncertainty involved. Guided by relevant social science and computational graph theories, I develop conceptual and predictive models to gain insights into trusting behaviors in online social relationships.
In the first essay, I propose a conceptual model of trust formation in online social networks. This is the first study that integrates the existing graph-based view of trust formation in social networks with socio-psychological theories of trust to provide a richer …