Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert May 2006

Network Activity Arising From Optimal Diameters Of Neuronal Processes, Juliane Gansert

Theses

Electrical coupling provides an important pathway for signal transmission between neurons. In several regions of the mammalian brain electrical synapses have been detected, and their role in the synchronization of neural networks and the generation of oscillations has been studied theoretically. Recently, it has been found that the amplitude of the postsynaptic potential is maximized for a specific diameter of the postsynaptic fiber.

In this thesis, the impact of the fiber's diameter on the success or failure of the action potential initiation and propagation is studied theoretically. Systems of two coupled neurons, as well as small networks, are investigated. The …


Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil May 2006

Comparative Analysis Of Parametric, Nonparametric And Permutation Methods For Differential Expression, Rahul Patil

Theses

DNA microarrays permit us to study the expression of thousands of genes simultaneously. They are now used in many different contexts to compare mRNA levels between two or more samples of cells. Microarray experiments typically give us expression measurements on a large number of genes. Increasing popularity of microarray technology has resulted in a number of tests being proposed to detect differentials expression.

The purpose of study is to compare the parametric, non parametric and permutation tests when applied to microarray data for differential expression analysis. t test (parametric), Mann Whitney test (nonparametric) and Significance of analysis (permutation ) test …


A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala May 2006

A Data Gathering Toolkit For Biological Information Integration, Munira Lokhandwala

Theses

SYSTERS is a biological information integration system containing protein sequences from many protein databases such as Swiss-Prot and TrEMBL and also protein sequences from complete genomes available at Ensembl, The Arabidopsis Information Resource, SGD and GeneDB. For some protein sequences their encoding nucleotide sequences can be found in their corresponding websites. However, for some protein sequences their encoding nucleotide sequences are missing.

The goal of this thesis is to. collect all nucleotide sequences for the protein sequences in SYSTERS and store them in a common database. There are two cases. The first case is that if the nucleotide sequences can …


Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam May 2006

Separation Of Ssl Protocol Phases Across Process Boundaries, Kirthikar Anantharam

Theses

Secure Sockets Layer is the de-facto standard used in the industry today for secure communications through web sites. An SSL connection is established by performing a Handshake, which is followed by the Record phase. While the SSL Handshake is computationally intensive and can cause of bottlenecks on an application server, the Record phase can cause similar bottlenecks while encrypting large volumes of data.

SSL Accelerators have been used to improve the performance of SSL-based application servers. These devices are expensive, complex to configure and inflexible to customizations. By separating the SSL Handshake and the Record phases into separate software processes, …


Smart Home Technology For Aging, Fareedh Meeran May 2006

Smart Home Technology For Aging, Fareedh Meeran

Theses

The majority of the growing population, in the US and the rest of the world requires some degree of formal and or informal care either due to the loss of function or failing health as a result of aging and most of them suffer from chronic disorders. The cost and burden of caring for elders is steadily increasing. This thesis focuses on providing the analysis of the technologies with which a Smart Home is built to improve the quality of life of the elderly. A great deal of emphasis is given to the sensor technologies that are the back bone …


Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren May 2006

Finding Role Errors Of The Ncit Gene Hierarchy Using The Ncbi, Marc Oren

Theses

Due to the knowledge discovery process of gene information, details such as organism and chromosomal location should be known. Furthermore, the extensive biomedical research in genomics led to discovery of processes and diseases in which a gene plays a role. In the Gene hierarchy of the NCI Thesaurus (NCIT) such knowledge is represented by appropriate roles. However, upon review of the Gene hierarchy of the NCIT, many role errors are found. Realizing that such details are provided by another knowledge repository of NIH, the NCBI gene database, a methodology is presented to use NCBI to discover role errors for the …


The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah May 2006

The Effects Of Limited Rebuild Buffer And Track Buffers On Rebuild Time In Raid5, Chintan Shah

Theses

Redundant Arrays of Independent Disks (RAID) are very popular for creating large, reliable storage systems. A RAID array consists of multiple independent disks that achieve fault tolerance by parity coding. The contents on a failed disk can be reconstructed on demand by reading and exciusive-ORing the corresponding blocks on surviving disks. Upon disk failure, the array enters rebuild mode when it begins to systematically reconstruct the data of the failed disk on a spare disk, provided one is available. The fundamental element of rebuild is the Rebuild Unit (RU).

Surviving disks engaged in rebuild, process user requests at a higher …


Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma May 2006

Dynamic Recomposition Of Documents From Distributed Data Sources, Abhishek Verma

Theses

Dynamic recomposition of documents refers to the process of on-the-fly creation of documents. A document can be generated from several documents that are stored at distributed data sites. The source can be queried and results obtained in the form of XML. These XML documents can be combined after a series of transformation operations to obtain the target document. The resultant document can be stored statically or in the form of a command, which can be invoked later to recompose this document dynamically. Also, in case a change is made to a document, then only the change can be stored, instead …


Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba Jan 2006

Model Driven Architecture - A Tool For Enterprise Architecture : A Look At Emergency Response Systems, Ritu Lamba

Theses

Today's fast changing markets and technology drive software industry to deliver high quality enterprise software solutions. The enterprise system architecture should be designed to keep business functions separate from technological implementation to accommodate the fast changing business environment.

In this thesis we have studied the current best practices in defining enterprise architectures and Zachman's framework in particular. We have further examined the Model Driven Architecture (MDA) approach and its application to enterprise architecture definition. MDA separates the business logic from the underlying platform technology and defines a representation model based on precise semantics. Zachman's framework defines a set of views …


Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara Jan 2006

Classifying Rna Secondary Structures Using Support Vector Machines, Prathy Usha Sunkara

Theses

In contrast to DNA, RNA prevails as a single strand. As a consequence of small self-complementary regions, RNA commonly exhibits an intricate secondary structure, consisting of relatively short, double helical segments alternated with single stranded regions. The amount of sequence data available is rising rapidly day by day. One of the problems encountered on a specific molecule is finding the relevant data between the massive number of other sequences to be done by reading lists with a short description of all new entries in large databases already existing. One of the main objectives of this work is to take the …


Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria Jan 2006

Classifying Malicious Windows Executables Using Anomaly Based Detection, Ronak Sutaria

Theses

A malicious executable is broadly defined as any program or piece of code designed to cause damage to a system or the information it contains, or to prevent the system from being used in a normal manner. A generic term used to describe any kind of malicious software is Maiware, which includes Viruses, Worms, Trojans, Backdoors, Root-kits, Spyware and Exploits. Anomaly detection is technique which builds a statistical profile of the normal and malicious data and classifies unseen data based on these two profiles.

A detection system is presented here which is anomaly based and focuses on the Windows® platform. …


A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar Jan 2006

A New Approach To Feature Extraction For Rna Structure Comparision, Girish Prakash Walawalkar

Theses

In recent years, RNA structural comparison becomes a crucial problem in bioinformatics research. Generally, it is a popular approach for representing the RNA secondary structures with arc-annotation sets. Several methods can be used to compare two RNA structures, such as tree edit distance, longest arc-preserving common subsequence (LAPCS) and stem based alignment. However, these methods may be helpful only for small RNA structures because of their high time complexity. In this thesis, we propose a simplified method to compare two RNA structures in O(mn) time, where m and n are the lengths of the two RNA sequences, respectively. The method …


Evolutionary Algorithms For Production Scheduling, Pio Fenton Jan 2006

Evolutionary Algorithms For Production Scheduling, Pio Fenton

Theses

The permutation with repetition representation is a powerful representation primarily used in the GA-JSSP domain. Recently, attention has shifted from this representation for simple GA and towards JSSP resolution using messy GA. This work returns to the permutation with repetition representation for simple GA with the intention of exploring some previously unexplored aspects. A new 1-point crossover operator is introduced which is shown to be more successful than the current standard operator for this representation. A technique known as morphogenic computation is employed with this representation for the first time and a thorough analysis of its performance is presented. While …


Electronic Mathematics, Aidan O'Donoghue Jan 2006

Electronic Mathematics, Aidan O'Donoghue

Theses

Recent times have seen an explosion in the use of interactive technologies in the delivery of learning content to students in all educational sectors in Ireland. This expansion has led to the creation of modem day phenomenons such as global and ‘teacherless’ classrooms.

The research study I have undertaken is to determine if students perform to the same standard when learning through an interactive educational software application as opposed to a more traditional setting of learning ’through’ a teacher in a classroom. The application being developed for this study enables students to learn the ordinary level leaving certificate mathematics course …


Development Of A Service-Oriented Communication Platform For Heterogeneous Voice Over Ip Networks., Aisling O'Driscoll Jan 2006

Development Of A Service-Oriented Communication Platform For Heterogeneous Voice Over Ip Networks., Aisling O'Driscoll

Theses

As broadband services have become more widespread in recent years due to a variety of government initiatives and the establishment of Wireless Internet Service Providers, user requirements have evolved and the market has become more competitive. Whilst this is beneficial for consumers it means that Internet Service Providers must offer a more diverse range of services coupled with standard broadband packages to distinguish themselves from their competitors, generate new revenue and strengthen their competitive advantage. Therefore many providers are looking to Service Oriented Architectures (SOAs) to provide communication platforms, enabling services such as Voice over IP (VoIP) along with other …