Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

PDF

Computer Science

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 38

Full-Text Articles in Physical Sciences and Mathematics

Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey Aug 2015

Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey

Theses and Dissertations

Computer science students are expected to learn and apply a variety of core algorithms which are an essential part of the field. Any one of these algorithms by itself is not necessarily extremely complex, but remembering the large variety of algorithms and the differences between them is challenging. To address this challenge, we present a novel algorithm visualization tool designed to enhance students understanding of Dijkstra’s algorithm by allowing them to discover the rules of the algorithm for themselves. It is hoped that a deeper understanding of the algorithm will help students correctly select, adapt and apply the appropriate algorithm …


An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton Jun 2015

An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton

CCE Theses and Dissertations

Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness.

While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance …


A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce May 2015

A Dynamic Behavioral Biometric Approach To Authenticate Users Employing Their Fingers To Interact With Touchscreen Devices, Arturo Ponce

CCE Theses and Dissertations

The use of mobile devices has extended to all areas of human life and has changed the way people work and socialize. Mobile devices are susceptible to getting lost, stolen, or compromised. Several approaches have been adopted to protect the information stored on these devices. One of these approaches is user authentication. The two most popular methods of user authentication are knowledge based and token based methods but they present different kinds of problems.

Biometric authentication methods have emerged in recent years as a way to deal with these problems. They use an individual’s unique characteristics for identification and have …


Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett May 2015

Locating Potential Aspect Interference Using Clustering Analysis, Brian Todd Bennett

CCE Theses and Dissertations

Software design continues to evolve from the structured programming paradigm of the 1970s and 1980s and the object-oriented programming (OOP) paradigm of the 1980s and 1990s. The functional decomposition design methodology used in these paradigms reduced the prominence of non-functional requirements, which resulted in scattered and tangled code to address non-functional elements. Aspect-oriented programming (AOP) allowed the removal of crosscutting concerns scattered throughout class code into single modules known as aspects. Aspectization resulted in increased modularity in class code, but introduced new types of problems that did not exist in OOP. One such problem was aspect interference, in which aspects …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


News Feeds Clustering Research Study, Haytham Abuel-Futuh Apr 2015

News Feeds Clustering Research Study, Haytham Abuel-Futuh

CCE Theses and Dissertations

With over 0.25 billion web pages hosted in the World Wide Web, it is virtually impossible to navigate through the Internet. Many applications try to help users achieve this task. For example, search engines build indexes to make the entire World Wide Web searchable, and news curators allow users to browse topics of interest on different structured sites. One problem that arises for these applications and others with similar goals is identifying documents with similar contents. This helps the applications show users documents with unique contents as well as group various similar documents under similar topics. There has been a …


Excitonic And Logic Gates On Dna Brick Nanobreadboards, Brittany L. Cannon, Donald L. Kellis, Paul H. Davis, Jeunghoon Lee, Wan Kuang, William L. Hughes, Elton Graugnard, Bernard Yurke, William Knowlton Mar 2015

Excitonic And Logic Gates On Dna Brick Nanobreadboards, Brittany L. Cannon, Donald L. Kellis, Paul H. Davis, Jeunghoon Lee, Wan Kuang, William L. Hughes, Elton Graugnard, Bernard Yurke, William Knowlton

Chemistry and Biochemistry Faculty Publications and Presentations

A promising application of DNA self-assembly is the fabrication of chromophore-based excitonic devices. DNA brick assembly is a compelling method for creating programmable nanobreadboards on which chromophores may be rapidly and easily repositioned to prototype new excitonic devices, optimize device operation, and induce reversible switching. Using DNA nanobreadboards, we have demonstrated each of these functions through the construction and operation of two different excitonic AND logic gates. The modularity and high chromophore density achievable via this brick-based approach provide a viable path toward developing information processing and storage systems.


Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis Jan 2015

Design Of A Novel Low - Cost, Portable, 3d Ultrasound System With Extended Imaging Capabilities For Point-Of-Care Applications, Michail Tsakalakis

Browse all Theses and Dissertations

Ultrasound Imaging (USI) or Medical Sonography (MS), as it is formally called, has been widely used in biomedical applications over the last decades. USI can provide clinicians with a thorough view of the internal parts of the human body, making use of sound waves of higher frequencies than humans can perceive. USI systems are considered highly portable and of low-cost, compared to other imaging modalities. However, despite those advantages, Ultrasound Systems (US) and especially 3D ones, have not been yet extensively utilized for Point-of-Care (POC) applications, due to numerous restrictions and artifacts that they currently present.

Hardware complexity and real-time …


Object Oriented Programming, Praveen Khethavath Jan 2015

Object Oriented Programming, Praveen Khethavath

Open Educational Resources

Students write a program that reads data based on a provided banking scenario, work on inputs, and generate a report after the data is processed.


07. Criminal Justice, Northeastern State University Jan 2015

07. Criminal Justice, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


04. Botany, Northeastern State University Jan 2015

04. Botany, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


06. Computer Science, Northeastern State University Jan 2015

06. Computer Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


03. Biology, Northeastern State University Jan 2015

03. Biology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


08. Engineering, Northeastern State University Jan 2015

08. Engineering, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


10. Forensic Science, Northeastern State University Jan 2015

10. Forensic Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


11. Genetics, Northeastern State University Jan 2015

11. Genetics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


14. Optometry, Northeastern State University Jan 2015

14. Optometry, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


16. Physics, Northeastern State University Jan 2015

16. Physics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


17. Psychology, Northeastern State University Jan 2015

17. Psychology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


13. Mathematics, Northeastern State University Jan 2015

13. Mathematics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


18. Statistics, Northeastern State University Jan 2015

18. Statistics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java Jan 2015

Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java

CCE Theses and Dissertations

Measures of classical rhetorical structure in text can improve accuracy in certain types of stylistic classification tasks such as authorship attribution. This research augments the relatively scarce work in the automated identification of rhetorical figures and uses the resulting statistics to characterize an author's rhetorical style. These characterizations of style can then become part of the feature set of various classification models.

Our Rhetorica software identifies 14 classical rhetorical figures in free English text, with generally good precision and recall, and provides summary measures to use in descriptive or classification tasks. Classification models trained on Rhetorica's rhetorical measures paired with …


Fail-Safe Testing Of Web Applications, Salah Boukhris Jan 2015

Fail-Safe Testing Of Web Applications, Salah Boukhris

Electronic Theses and Dissertations

This dissertation introduces an approach to generate tests to test fail-safe behavior for web applications. We apply the approach to a commercial web application. We build models for both behavioral and mitigation requirements. We create mitigation tests from an existing functional black box test suite by determining failure type and points of failure in the test suite and weaving required mitigation based on weaving rules to generate a test suite that tests proper mitigation of failures. A genetic algorithm (GA) is used to determine points of failure and type of failure that needs to be tested. Mitigation test paths are …


Isolation In Synchronized Drone Formations, Andrew P. Brunner Jan 2015

Isolation In Synchronized Drone Formations, Andrew P. Brunner

Electronic Theses and Dissertations

This paper expands on a theoretical model that is used for aerial robots that are working cooperatively to complete a task. In certain situations, such as when multiple robots have catastrophic failures, the surviving robots could become isolated so that they never again communicate with another robot. We prove some properties about isolated robots flying in a grid formation, and we present an algorithm that determines how many robots need to fail to isolate at least one robot. Finally, we propose a strategy that eliminates the possibility of isolation altogether.


02. Animal Science, Northeastern State University Jan 2015

02. Animal Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


05. Chemistry, Northeastern State University Jan 2015

05. Chemistry, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


09. Environmental Science, Northeastern State University Jan 2015

09. Environmental Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


12. Kinesiology, Northeastern State University Jan 2015

12. Kinesiology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


15. Pharmacy, Northeastern State University Jan 2015

15. Pharmacy, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


19. Zoology, Northeastern State University Jan 2015

19. Zoology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.