Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Data mining (2)
- Image processing (2)
- Support vector machine (2)
- 2d & 3d (1)
- ALN (1)
-
- Abstraction networks (1)
- Active learning (1)
- Aging (1)
- Association rule (1)
- Association rule mining (1)
- Asynchronous learning network (ALN) (1)
- Auditing (1)
- Bioinformatics (1)
- Biological information integration (1)
- CBIR (1)
- CMS (1)
- Case study (1)
- Change propagation (1)
- Clustered RNA (1)
- Color (1)
- Color imaging (1)
- Color quantization (1)
- Computer science (1)
- Computer sciences (1)
- Concept structure (1)
- Controlled terminology (1)
- Convolution filters (1)
- Decision support systems (1)
- Design theory (1)
- Differential expression analysis (1)
- Publication
Articles 1 - 25 of 25
Full-Text Articles in Physical Sciences and Mathematics
The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet
The Viability Of Is Enhanced Knowledge Sharing In Mission-Critical Command And Control Centers, Sameh A. Sabet
Dissertations
Engineering processes such as the maintenance of mission-critical infrastructures are highly unpredictable processes that are vital for everyday life, as well as for national security goals. These processes are categorized as Emergent Knowledge Processes (EKP), organizational processes that are characterized by a changing set of actors, distributed knowledge bases, and emergent knowledge sharing activities where the process itself has no predetermined structure. The research described here utilizes the telecommunications network fault diagnosis process as a specific example of an EKP. The field site chosen for this research is a global undersea telecommunication network where nodes are staffed by trained personnel …
Facial Analysis In Video : Detection And Recognition, Peichung Shih
Facial Analysis In Video : Detection And Recognition, Peichung Shih
Dissertations
Biometric authentication systems automatically identify or verify individuals using physiological (e.g., face, fingerprint, hand geometry, retina scan) or behavioral (e.g., speaking pattern, signature, keystroke dynamics) characteristics. Among these biometrics, facial patterns have the major advantage of being the least intrusive. Automatic face recognition systems thus have great potential in a wide spectrum of application areas. Focusing on facial analysis, this dissertation presents a face detection method and numerous feature extraction methods for face recognition.
Concerning face detection, a video-based frontal face detection method has been developed using motion analysis and color information to derive field of interests, and distribution-based distance …
Enhancing Web Marketing By Using Ontology, Xuan Zhou
Enhancing Web Marketing By Using Ontology, Xuan Zhou
Dissertations
The existence of the Web has a major impact on people's life styles. Online shopping, online banking, email, instant messenger services, search engines and bulletin boards have gradually become parts of our daily life. All kinds of information can be found on the Web. Web marketing is one of the ways to make use of online information. By extracting demographic information and interest information from the Web, marketing knowledge can be augmented by applying data mining algorithms. Therefore, this knowledge which connects customers to products can be used for marketing purposes and for targeting existing and potential customers. The Web …
Structural Auditing Methodologies For Controlled Terminologies, Hua Min
Structural Auditing Methodologies For Controlled Terminologies, Hua Min
Dissertations
Several auditing methodologies for large controlled terminologies are developed. These are applied to the Unified Medical Language System XXXX and the National Cancer Institute Thesaurus (NCIT). Structural auditing methodologies are based on the structural aspects such as IS-A hierarchy relationships groups of concepts assigned to semantic types and groups of relationships defined for concepts. Structurally uniform groups of concepts tend to be semantically uniform. Structural auditing methodologies focus on concepts with unlikely or rare configuration. These concepts have a high likelihood for errors.
One of the methodologies is based on comparing hierarchical relationships between the META and SN, two major …
Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert
Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert
Theses
Electrical coupling provides an important pathway for signal transmission between neurons. In several regions of the mammalian brain electrical synapses have been detected, and their role in the synchronization of neural networks and the generation of oscillations has been studied theoretically. Recently, it has been found that the amplitude of the postsynaptic potential is maximized for a specific diameter of the postsynaptic fiber.
In this thesis, the impact of the fiber's diameter on the success or failure of the action potential initiation and propagation is studied theoretically. Systems of two coupled neurons, as well as small networks, are investigated. The …
Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil
Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil
Theses
DNA microarrays permit us to study the expression of thousands of genes simultaneously. They are now used in many different contexts to compare mRNA levels between two or more samples of cells. Microarray experiments typically give us expression measurements on a large number of genes. Increasing popularity of microarray technology has resulted in a number of tests being proposed to detect differentials expression.
The purpose of study is to compare the parametric, non parametric and permutation tests when applied to microarray data for differential expression analysis. t test (parametric), Mann Whitney test (nonparametric) and Significance of analysis (permutation ) test …
A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala
A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala
Theses
SYSTERS is a biological information integration system containing protein sequences from many protein databases such as Swiss-Prot and TrEMBL and also protein sequences from complete genomes available at Ensembl, The Arabidopsis Information Resource, SGD and GeneDB. For some protein sequences their encoding nucleotide sequences can be found in their corresponding websites. However, for some protein sequences their encoding nucleotide sequences are missing.
The goal of this thesis is to. collect all nucleotide sequences for the protein sequences in SYSTERS and store them in a common database. There are two cases. The first case is that if the nucleotide sequences can …
Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam
Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam
Theses
Secure Sockets Layer is the de-facto standard used in the industry today for secure communications through web sites. An SSL connection is established by performing a Handshake, which is followed by the Record phase. While the SSL Handshake is computationally intensive and can cause of bottlenecks on an application server, the Record phase can cause similar bottlenecks while encrypting large volumes of data.
SSL Accelerators have been used to improve the performance of SSL-based application servers. These devices are expensive, complex to configure and inflexible to customizations. By separating the SSL Handshake and the Record phases into separate software processes, …
Smart Home Technology For Aging, Fareedh Meeran
Smart Home Technology For Aging, Fareedh Meeran
Theses
The majority of the growing population, in the US and the rest of the world requires some degree of formal and or informal care either due to the loss of function or failing health as a result of aging and most of them suffer from chronic disorders. The cost and burden of caring for elders is steadily increasing. This thesis focuses on providing the analysis of the technologies with which a Smart Home is built to improve the quality of life of the elderly. A great deal of emphasis is given to the sensor technologies that are the back bone …
Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren
Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren
Theses
Due to the knowledge discovery process of gene information, details such as organism and chromosomal location should be known. Furthermore, the extensive biomedical research in genomics led to discovery of processes and diseases in which a gene plays a role. In the Gene hierarchy of the NCI Thesaurus (NCIT) such knowledge is represented by appropriate roles. However, upon review of the Gene hierarchy of the NCIT, many role errors are found. Realizing that such details are provided by another knowledge repository of NIH, the NCBI gene database, a methodology is presented to use NCBI to discover role errors for the …
The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah
The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah
Theses
Redundant Arrays of Independent Disks (RAID) are very popular for creating large, reliable storage systems. A RAID array consists of multiple independent disks that achieve fault tolerance by parity coding. The contents on a failed disk can be reconstructed on demand by reading and exciusive-ORing the corresponding blocks on surviving disks. Upon disk failure, the array enters rebuild mode when it begins to systematically reconstruct the data of the failed disk on a spare disk, provided one is available. The fundamental element of rebuild is the Rebuild Unit (RU).
Surviving disks engaged in rebuild, process user requests at a higher …
Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma
Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma
Theses
Dynamic recomposition of documents refers to the process of on-the-fly creation of documents. A document can be generated from several documents that are stored at distributed data sites. The source can be queried and results obtained in the form of XML. These XML documents can be combined after a series of transformation operations to obtain the target document. The resultant document can be stored statically or in the form of a command, which can be invoked later to recompose this document dynamically. Also, in case a change is made to a document, then only the change can be stored, instead …
Text Mining With Exploitation Of User's Background Knowledge : Discovering Novel Association Rules From Text, Xin Chen
Dissertations
The goal of text mining is to find interesting and non-trivial patterns or knowledge from unstructured documents. Both objective and subjective measures have been proposed in the literature to evaluate the interestingness of discovered patterns. However, objective measures alone are insufficient because such measures do not consider knowledge and interests of the users. Subjective measures require explicit input of user expectations which is difficult or even impossible to obtain in text mining environments.
This study proposes a user-oriented text-mining framework and applies it to the problem of discovering novel association rules from documents. The developed system, uMining, consists of two …
Facial Feature Representation And Recognition, Chao-Fa Chuang
Facial Feature Representation And Recognition, Chao-Fa Chuang
Dissertations
Facial expression provides an important behavioral measure for studies of emotion, cognitive processes, and social interaction. Facial expression representation and recognition have become a promising research area during recent years. Its applications include human-computer interfaces, human emotion analysis, and medical care and cure.
In this dissertation, the fundamental techniques will be first reviewed, and the developments of the novel algorithms and theorems will be presented later. The objective of the proposed algorithm is to provide a reliable, fast, and integrated procedure to recognize either seven prototypical, emotion-specified expressions (e.g., happy, neutral, angry, disgust, fear, sad, and surprise in JAFFE database) …
Color Image Quality Measures And Retrieval, Yan-Yu Fu
Color Image Quality Measures And Retrieval, Yan-Yu Fu
Dissertations
The focus of this dissertation is mainly on color image, especially on the images with lossy compression. Issues related to color quantization, color correction, color image retrieval and color image quality evaluation are addressed. A no-reference color image quality index is proposed. A novel color correction method applied to low bit-rate JPEG image is developed. A novel method for content-based image retrieval based upon combined feature vectors of shape, texture, and color similarities has been suggested. In addition, an image specific color reduction method has been introduced, which allows a 24-bit JPEG image to be shown in the 8-bit color …
Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz
Dynamic Measuring Tools For Online Discourse, Jeffrey S. Saltz
Dissertations
When evaluating participation within an Asynchronous Learning Network (ALN), current best practices include counting messages and reviewing participant surveys. To understand the impact of more advanced dynamic measurement tools for use within an ALN, a web-based tool, known as iPET (the integrated Participation Evaluation Tool), was created. iPET, which leverages Social Network Analysis and Information Visualization techniques, was then evaluated via an empirical study. This research demonstrates that using a tool such as iPET increases participation within an ALN without increasing facilitator workload. Due to the fact that active online discussion is a key factor in the success of an …
Quantifying Software Architecture Attributes, Bo Yu
Quantifying Software Architecture Attributes, Bo Yu
Dissertations
Software architecture holds the promise of advancing the state of the art in software engineering. The architecture is emerging as the focal point of many modem reuse/evolutionary paradigms, such as Product Line Engineering, Component Based Software Engineering, and COTS-based software development.
The author focuses his research work on characterizing some properties of a software architecture. He tries to use software metrics to represent the error propagation probabilities, change propagation probabilities, and requirements change propagation probabilities of a software architecture. Error propagation probability reflects the probability that an error that arises in one component of the architecture will propagate to other …
Bioinformatics Framework For Genotyping Microarray Data Analysis, Kai Zhang
Bioinformatics Framework For Genotyping Microarray Data Analysis, Kai Zhang
Dissertations
Functional genomics is a flourishing science enabled by recent technological breakthroughs in high-throughput instrumentation and microarray data analysis. Genotyping microarrays establish the genotypes of DNA sequences containing single nucleotide polymorphisms (SNPs), and can help biologists probe the functions of different genes and/or construct complex gene interaction networks. The enormous amount of data from these experiments makes it infeasible to perform manual processing to obtain accurate and reliable results in daily routines. Advanced algorithms as well as an integrated software toolkit are needed to help perform reliable and fast data analysis.
The author developed a MatlabTM based software package, called …
Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby
Using Content And Process Scaffolds For Collaborative Discourse In Asynchronous Learning Networks, Irene Wong-Bushby
Dissertations
Discourse, a form of collaborative learning, is one of the most widely used methods of teaching and learning in the online environment. Particularly, in large courses, discourse needs to be 'structured' to be effective. Historically, technology-mediated learning (TML) research has been inconclusive with often conflicting results. To address this issue, TML research needs greater breadth and depth in pedagogical grounding. The purpose of this research is to build and test an original, technology-mediated, discourse-centered model called the Asynchronous Learning Network Cognitive Discourse Model (ALNCDM) grounded in pedagogy. Cognitive discourse is defined as discourse on conceptual subject matter. The model is …
Image Segmentation And Pattern Classification Using Support Vector Machines, Shouxian Cheng
Image Segmentation And Pattern Classification Using Support Vector Machines, Shouxian Cheng
Dissertations
Image segmentation and pattern classification have long been important topics in computer science research. Image segmentation is one of the basic and challenging lower-level image processing tasks. Feature extraction, feature reduction, and classifier design based on selected features are the three essential issues for the pattern classification problem.
In this dissertation, an automatic Seeded Region Growing (SRG) algorithm for color image segmentation is developed. In the SRG algorithm, the initial seeds are automatically determined. An adaptive morphological edge-linking algorithm to fill in the gaps between edge segments is designed. Broken edges are extended along their slope directions by using the …
Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu
Automatic Solar Feature Detection Using Image Processing And Pattern Recognition Techniques, Ming Qu
Dissertations
The objective of the research in this dissertation is to develop a software system to automatically detect and characterize solar flares, filaments and Corona Mass Ejections (CMEs), the core of so-called solar activity. These tools will assist us to predict space weather caused by violent solar activity. Image processing and pattern recognition techniques are applied to this system.
For automatic flare detection, the advanced pattern recognition techniques such as Multi-Layer Perceptron (MLP), Radial Basis Function (RBF), and Support Vector Machine (SVM) are used. By tracking the entire process of flares, the motion properties of two-ribbon flares are derived automatically. In …
Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba
Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba
Theses
Today's fast changing markets and technology drive software industry to deliver high quality enterprise software solutions. The enterprise system architecture should be designed to keep business functions separate from technological implementation to accommodate the fast changing business environment.
In this thesis we have studied the current best practices in defining enterprise architectures and Zachman's framework in particular. We have further examined the Model Driven Architecture (MDA) approach and its application to enterprise architecture definition. MDA separates the business logic from the underlying platform technology and defines a representation model based on precise semantics. Zachman's framework defines a set of views …
Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara
Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara
Theses
In contrast to DNA, RNA prevails as a single strand. As a consequence of small self-complementary regions, RNA commonly exhibits an intricate secondary structure, consisting of relatively short, double helical segments alternated with single stranded regions. The amount of sequence data available is rising rapidly day by day. One of the problems encountered on a specific molecule is finding the relevant data between the massive number of other sequences to be done by reading lists with a short description of all new entries in large databases already existing. One of the main objectives of this work is to take the …
Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria
Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria
Theses
A malicious executable is broadly defined as any program or piece of code designed to cause damage to a system or the information it contains, or to prevent the system from being used in a normal manner. A generic term used to describe any kind of malicious software is Maiware, which includes Viruses, Worms, Trojans, Backdoors, Root-kits, Spyware and Exploits. Anomaly detection is technique which builds a statistical profile of the normal and malicious data and classifies unseen data based on these two profiles.
A detection system is presented here which is anomaly based and focuses on the Windows® platform. …
A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar
A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar
Theses
In recent years, RNA structural comparison becomes a crucial problem in bioinformatics research. Generally, it is a popular approach for representing the RNA secondary structures with arc-annotation sets. Several methods can be used to compare two RNA structures, such as tree edit distance, longest arc-preserving common subsequence (LAPCS) and stem based alignment. However, these methods may be helpful only for small RNA structures because of their high time complexity. In this thesis, we propose a simplified method to compare two RNA structures in O(mn) time, where m and n are the lengths of the two RNA sequences, respectively. The method …