Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet Aug 2006

The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet

Dissertations

Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …


Facial Analysis In Video : Detection And Recognition, Peichung Shih May 2006

Facial Analysis In Video : Detection And Recognition, Peichung Shih

Dissertations

Biometric authentication systems automatically identify or verify individuals using physiological (e.g., face, fingerprint, hand geometry, retina scan) or behavioral (e.g., speaking pattern, signature, keystroke dynamics) characteristics. Among these biometrics, facial patterns have the major advantage of being the least intrusive. Automatic face recognition systems thus have great potential in a wide spectrum of application areas. Focusing on facial analysis, this dissertation presents a face detection method and numerous feature extraction methods for face recognition.

Concerning face detection, a video-based frontal face detection method has been developed using motion analysis and color information to derive field of interests, and distribution-based distance …


Enhancing Web Marketing By Using Ontology, Xuan Zhou May 2006

Enhancing Web Marketing By Using Ontology, Xuan Zhou

Dissertations

The existence of the Web has a major impact on people's life styles. Online shopping, online banking, email, instant messenger services, search engines and bulletin boards have gradually become parts of our daily life. All kinds of information can be found on the Web. Web marketing is one of the ways to make use of online information. By extracting demographic information and interest information from the Web, marketing knowledge can be augmented by applying data mining algorithms. Therefore, this knowledge which connects customers to products can be used for marketing purposes and for targeting existing and potential customers. The Web …


Structural Auditing Methodologies For Controlled Terminologies, Hua Min May 2006

Structural Auditing Methodologies For Controlled Terminologies, Hua Min

Dissertations

Several auditing methodologies for large controlled terminologies are developed. These are applied to the Unified Medical Language System XXXX and the National Cancer Institute Thesaurus (NCIT). Structural auditing methodologies are based on the structural aspects such as IS-A hierarchy relationships groups of concepts assigned to semantic types and groups of relationships defined for concepts. Structurally uniform groups of concepts tend to be semantically uniform. Structural auditing methodologies focus on concepts with unlikely or rare configuration. These concepts have a high likelihood for errors.

One of the methodologies is based on comparing hierarchical relationships between the META and SN, two major …


Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert May 2006

Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert

Theses

Electrical coupling provides an important pathway for signal transmission between neurons. In several regions of the mammalian brain electrical synapses have been detected, and their role in the synchronization of neural networks and the generation of oscillations has been studied theoretically. Recently, it has been found that the amplitude of the postsynaptic potential is maximized for a specific diameter of the postsynaptic fiber.

In this thesis, the impact of the fiber's diameter on the success or failure of the action potential initiation and propagation is studied theoretically. Systems of two coupled neurons, as well as small networks, are investigated. The …


Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil May 2006

Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil

Theses

DNA microarrays permit us to study the expression of thousands of genes simultaneously. They are now used in many different contexts to compare mRNA levels between two or more samples of cells. Microarray experiments typically give us expression measurements on a large number of genes. Increasing popularity of microarray technology has resulted in a number of tests being proposed to detect differentials expression.

The purpose of study is to compare the parametric, non parametric and permutation tests when applied to microarray data for differential expression analysis. t test (parametric), Mann Whitney test (nonparametric) and Significance of analysis (permutation ) test …


A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala May 2006

A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala

Theses

SYSTERS is a biological information integration system containing protein sequences from many protein databases such as Swiss-Prot and TrEMBL and also protein sequences from complete genomes available at Ensembl, The Arabidopsis Information Resource, SGD and GeneDB. For some protein sequences their encoding nucleotide sequences can be found in their corresponding websites. However, for some protein sequences their encoding nucleotide sequences are missing.

The goal of this thesis is to. collect all nucleotide sequences for the protein sequences in SYSTERS and store them in a common database. There are two cases. The first case is that if the nucleotide sequences can …


Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam May 2006

Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam

Theses

Secure Sockets Layer is the de-facto standard used in the industry today for secure communications through web sites. An SSL connection is established by performing a Handshake, which is followed by the Record phase. While the SSL Handshake is computationally intensive and can cause of bottlenecks on an application server, the Record phase can cause similar bottlenecks while encrypting large volumes of data.

SSL Accelerators have been used to improve the performance of SSL-based application servers. These devices are expensive, complex to configure and inflexible to customizations. By separating the SSL Handshake and the Record phases into separate software processes, …


Smart Home Technology For Aging, Fareedh Meeran May 2006

Smart Home Technology For Aging, Fareedh Meeran

Theses

The majority of the growing population, in the US and the rest of the world requires some degree of formal and or informal care either due to the loss of function or failing health as a result of aging and most of them suffer from chronic disorders. The cost and burden of caring for elders is steadily increasing. This thesis focuses on providing the analysis of the technologies with which a Smart Home is built to improve the quality of life of the elderly. A great deal of emphasis is given to the sensor technologies that are the back bone …


Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren May 2006

Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren

Theses

Due to the knowledge discovery process of gene information, details such as organism and chromosomal location should be known. Furthermore, the extensive biomedical research in genomics led to discovery of processes and diseases in which a gene plays a role. In the Gene hierarchy of the NCI Thesaurus (NCIT) such knowledge is represented by appropriate roles. However, upon review of the Gene hierarchy of the NCIT, many role errors are found. Realizing that such details are provided by another knowledge repository of NIH, the NCBI gene database, a methodology is presented to use NCBI to discover role errors for the …


The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah May 2006

The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah

Theses

Redundant Arrays of Independent Disks (RAID) are very popular for creating large, reliable storage systems. A RAID array consists of multiple independent disks that achieve fault tolerance by parity coding. The contents on a failed disk can be reconstructed on demand by reading and exciusive-ORing the corresponding blocks on surviving disks. Upon disk failure, the array enters rebuild mode when it begins to systematically reconstruct the data of the failed disk on a spare disk, provided one is available. The fundamental element of rebuild is the Rebuild Unit (RU).

Surviving disks engaged in rebuild, process user requests at a higher …


Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma May 2006

Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma

Theses

Dynamic recomposition of documents refers to the process of on-the-fly creation of documents. A document can be generated from several documents that are stored at distributed data sites. The source can be queried and results obtained in the form of XML. These XML documents can be combined after a series of transformation operations to obtain the target document. The resultant document can be stored statically or in the form of a command, which can be invoked later to recompose this document dynamically. Also, in case a change is made to a document, then only the change can be stored, instead …


Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen Jan 2006

Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen

Dissertations

The goal of text mining is to find interesting and non-trivial patterns or knowledge from unstructured documents. Both objective and subjective measures have been proposed in the literature to evaluate the interestingness of discovered patterns. However, objective measures alone are insufficient because such measures do not consider knowledge and interests of the users. Subjective measures require explicit input of user expectations which is difficult or even impossible to obtain in text mining environments.

This study proposes a user-oriented text-mining framework and applies it to the problem of discovering novel association rules from documents. The developed system, uMining, consists of two …


Facial Feature Representation And Recognition, Chao-Fa Chuang Jan 2006

Facial Feature Representation And Recognition, Chao-Fa Chuang

Dissertations

Facial expression provides an important behavioral measure for studies of emotion, cognitive processes, and social interaction. Facial expression representation and recognition have become a promising research area during recent years. Its applications include human-computer interfaces, human emotion analysis, and medical care and cure.

In this dissertation, the fundamental techniques will be first reviewed, and the developments of the novel algorithms and theorems will be presented later. The objective of the proposed algorithm is to provide a reliable, fast, and integrated procedure to recognize either seven prototypical, emotion-specified expressions (e.g., happy, neutral, angry, disgust, fear, sad, and surprise in JAFFE database) …


Color Image Quality Measures And Retrieval, Yan-Yu Fu Jan 2006

Color Image Quality Measures And Retrieval, Yan-Yu Fu

Dissertations

The focus of this dissertation is mainly on color image, especially on the images with lossy compression. Issues related to color quantization, color correction, color image retrieval and color image quality evaluation are addressed. A no-reference color image quality index is proposed. A novel color correction method applied to low bit-rate JPEG image is developed. A novel method for content-based image retrieval based upon combined feature vectors of shape, texture, and color similarities has been suggested. In addition, an image specific color reduction method has been introduced, which allows a 24-bit JPEG image to be shown in the 8-bit color …


Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz Jan 2006

Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz

Dissertations

When evaluating participation within an Asynchronous Learning Network (ALN), current best practices include counting messages and reviewing participant surveys. To understand the impact of more advanced dynamic measurement tools for use within an ALN, a web-based tool, known as iPET (the integrated Participation Evaluation Tool), was created. iPET, which leverages Social Network Analysis and Information Visualization techniques, was then evaluated via an empirical study. This research demonstrates that using a tool such as iPET increases participation within an ALN without increasing facilitator workload. Due to the fact that active online discussion is a key factor in the success of an …


Quantifying Software Architecture Attributes, Bo Yu Jan 2006

Quantifying Software Architecture Attributes, Bo Yu

Dissertations

Software architecture holds the promise of advancing the state of the art in software engineering. The architecture is emerging as the focal point of many modem reuse/evolutionary paradigms, such as Product Line Engineering, Component Based Software Engineering, and COTS-based software development.

The author focuses his research work on characterizing some properties of a software architecture. He tries to use software metrics to represent the error propagation probabilities, change propagation probabilities, and requirements change propagation probabilities of a software architecture. Error propagation probability reflects the probability that an error that arises in one component of the architecture will propagate to other …


Bioinformatics Framework For Genotyping Microarray Data Analysis, Kai Zhang Jan 2006

Bioinformatics Framework For Genotyping Microarray Data Analysis, Kai Zhang

Dissertations

Functional genomics is a flourishing science enabled by recent technological breakthroughs in high-throughput instrumentation and microarray data analysis. Genotyping microarrays establish the genotypes of DNA sequences containing single nucleotide polymorphisms (SNPs), and can help biologists probe the functions of different genes and/or construct complex gene interaction networks. The enormous amount of data from these experiments makes it infeasible to perform manual processing to obtain accurate and reliable results in daily routines. Advanced algorithms as well as an integrated software toolkit are needed to help perform reliable and fast data analysis.

The author developed a MatlabTM based software package, called …


Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby Jan 2006

Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby

Dissertations

Discourse, a form of collaborative learning, is one of the most widely used methods of teaching and learning in the online environment. Particularly, in large courses, discourse needs to be 'structured' to be effective. Historically, technology-mediated learning (TML) research has been inconclusive with often conflicting results. To address this issue, TML research needs greater breadth and depth in pedagogical grounding. The purpose of this research is to build and test an original, technology-mediated, discourse-centered model called the Asynchronous Learning Network Cognitive Discourse Model (ALNCDM) grounded in pedagogy. Cognitive discourse is defined as discourse on conceptual subject matter. The model is …


Image Segmentation And Pattern Classification Using Support Vector Machines, Shouxian Cheng Jan 2006

Image Segmentation And Pattern Classification Using Support Vector Machines, Shouxian Cheng

Dissertations

Image segmentation and pattern classification have long been important topics in computer science research. Image segmentation is one of the basic and challenging lower-level image processing tasks. Feature extraction, feature reduction, and classifier design based on selected features are the three essential issues for the pattern classification problem.

In this dissertation, an automatic Seeded Region Growing (SRG) algorithm for color image segmentation is developed. In the SRG algorithm, the initial seeds are automatically determined. An adaptive morphological edge-linking algorithm to fill in the gaps between edge segments is designed. Broken edges are extended along their slope directions by using the …


Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu Jan 2006

Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu

Dissertations

The objective of the research in this dissertation is to develop a software system to automatically detect and characterize solar flares, filaments and Corona Mass Ejections (CMEs), the core of so-called solar activity. These tools will assist us to predict space weather caused by violent solar activity. Image processing and pattern recognition techniques are applied to this system.

For automatic flare detection, the advanced pattern recognition techniques such as Multi-Layer Perceptron (MLP), Radial Basis Function (RBF), and Support Vector Machine (SVM) are used. By tracking the entire process of flares, the motion properties of two-ribbon flares are derived automatically. In …


Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba Jan 2006

Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba

Theses

Today's fast changing markets and technology drive software industry to deliver high quality enterprise software solutions. The enterprise system architecture should be designed to keep business functions separate from technological implementation to accommodate the fast changing business environment.

In this thesis we have studied the current best practices in defining enterprise architectures and Zachman's framework in particular. We have further examined the Model Driven Architecture (MDA) approach and its application to enterprise architecture definition. MDA separates the business logic from the underlying platform technology and defines a representation model based on precise semantics. Zachman's framework defines a set of views …


Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara Jan 2006

Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara

Theses

In contrast to DNA, RNA prevails as a single strand. As a consequence of small self-complementary regions, RNA commonly exhibits an intricate secondary structure, consisting of relatively short, double helical segments alternated with single stranded regions. The amount of sequence data available is rising rapidly day by day. One of the problems encountered on a specific molecule is finding the relevant data between the massive number of other sequences to be done by reading lists with a short description of all new entries in large databases already existing. One of the main objectives of this work is to take the …


Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria Jan 2006

Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria

Theses

A malicious executable is broadly defined as any program or piece of code designed to cause damage to a system or the information it contains, or to prevent the system from being used in a normal manner. A generic term used to describe any kind of malicious software is Maiware, which includes Viruses, Worms, Trojans, Backdoors, Root-kits, Spyware and Exploits. Anomaly detection is technique which builds a statistical profile of the normal and malicious data and classifies unseen data based on these two profiles.

A detection system is presented here which is anomaly based and focuses on the Windows® platform. …


A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar Jan 2006

A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar

Theses

In recent years, RNA structural comparison becomes a crucial problem in bioinformatics research. Generally, it is a popular approach for representing the RNA secondary structures with arc-annotation sets. Several methods can be used to compare two RNA structures, such as tree edit distance, longest arc-preserving common subsequence (LAPCS) and stem based alignment. However, these methods may be helpful only for small RNA structures because of their high time complexity. In this thesis, we propose a simplified method to compare two RNA structures in O(mn) time, where m and n are the lengths of the two RNA sequences, respectively. The method …