Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Effective Use Of Interactive Learning Modules In Classroom Study For Computer Science Education, Goldee Jamwal Dec 2012

Effective Use Of Interactive Learning Modules In Classroom Study For Computer Science Education, Goldee Jamwal

All Graduate Plan B and other Reports, Spring 1920 to Spring 2023

The National Science Foundation (NSF) is spending substantial resources to improve science, technology, engineering, and mathematics (STEM) education in the United States. The ultimate goal of these programs is to produce students with a better knowledge of math and science and who are more likely to pursue careers in STEM fields. Interactive learning modules can be used in the classroom environment for effective learning.

This study examines the learning preferences of Logan High School (located in Logan, Utah) students and evaluates the impacts of using interactive learning modules with classroom lectures compared to other traditional methods of teaching.


Enhancing Effective Depth-Of-Field By Multi-Focus Image Fusion Using Morphological Techniques., Ishita De Ghosh Dr. Nov 2012

Enhancing Effective Depth-Of-Field By Multi-Focus Image Fusion Using Morphological Techniques., Ishita De Ghosh Dr.

Doctoral Theses

A scene to be photographed, usually includes objects at varying distances from the camera. Depth-of-field of a digital camera is the range of distance, all objects within which appear to be sharp in the image. Due to the low depth-of-field of the camera, images acquired by them often suffer from degradation called out-of-foc us blur. One way to enhance the effective depth-of-field is to acquire se veral images of a scene with focus on different parts of it and then combine these images into a single image in such a way that all regions of the scene are in focus. …


Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 423 Network Intrusion Detection And Defense, Amanda Izenstark

Amanda Izenstark

Library Impact Statement in response to new course proposal for CSC 423 Network Intrusion Detection and Defense. New course was supported with no need for additional resources.


Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 523 Advanced Intrusion Detection And Defense, Amanda Izenstark

Amanda Izenstark

Library Impact Statement for CSC 523 Advanced Intrusion Detection and Defense. No new library resources are required to support this course.


Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark Nov 2012

Library Impact Statement For Csc 424 Live Forensics And Incident Response, Amanda Izenstark

Amanda Izenstark

Library Impact Statement in response to new course proposal for CSC 424 Live Forensics and Incident Response. New course was supported with no need for additional resources.


Blackbox Reduction Of Some Cryptographic Constructions., Rishiraj Bhattacharyya Dr. Oct 2012

Blackbox Reduction Of Some Cryptographic Constructions., Rishiraj Bhattacharyya Dr.

Doctoral Theses

No abstract provided.


Front Burner Jul 2012

Front Burner

Syracuse University Magazine

No abstract provided.


Infusing Computational Thinking Into The Middle- And High-School Curriculum, Amber Settle, Baker Franke, Ruth Hansen, Frances Spaltro, Cynthia Jurisson, Colin Rennert-May, Brian Wildeman Jul 2012

Infusing Computational Thinking Into The Middle- And High-School Curriculum, Amber Settle, Baker Franke, Ruth Hansen, Frances Spaltro, Cynthia Jurisson, Colin Rennert-May, Brian Wildeman

Amber Settle

In recent years there have been significant efforts to revamp undergraduate and K-12 curricula to emphasize computational thinking, a term popularized by Jeannette Wing in 2006. We describe work introducing and enhancing computational thinking activities and assessments in the middle- and high-school curriculum at the University of Chicago Lab Schools. In total six courses were altered as a part of the Computational Thinking across the Curriculum Project: middle-school and high-school computer science, and high-school Latin, graphic arts, English, and history. We detail the modifications to the curriculum and discuss the successes and challenges of the project.


Forensic Analysis Of Linux Physical Memory: Extraction And Resumption Of Running Processes., Ernest D. Mougoue May 2012

Forensic Analysis Of Linux Physical Memory: Extraction And Resumption Of Running Processes., Ernest D. Mougoue

Masters Theses, 2010-2019

Traditional digital forensics’ procedures to recover and analyze digital data were focused on media-type storage devices like hard drives, hoping to acquire evidence or traces of malicious behavior in stored files. Usually, investigators would image the data and explore it in a somewhat “safe” environment; this is meant to reduce as much as possible the amount of loss and corruption that might occur when analysis tools are used. Unfortunately, techniques developed by intruders to attack machines without leaving files on the disks and the ever dramatically increasing size of hard drives make the discovery of evidence difficult. These increased interest …


Some Results On Cryptanalysis Of Rsa And Factorization., Santanu Sarkar Dr. Feb 2012

Some Results On Cryptanalysis Of Rsa And Factorization., Santanu Sarkar Dr.

Doctoral Theses

In this thesis, we propose some new results in Cryptanalysis of RSA and related Factorization problems. Till date, the best known algorithm to solve the Integer Factorization problem is the Number Field Sieve, which has a runtime greater than exp(log1/3 N) for factoring an integer N. However, if one obtains certain information about the RSA parameters, there are algorithms which can factor the RSA modulus N = pq quite efficiently. The intention of this thesis is to identify such weaknesses of the RSA cryptosystem and its variants. Further we study results related to factorization.In Africacrypt 2008, Nitaj presented a class …


A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal Jan 2012

A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal

Konstantin Läufer

This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …


Enhancing The Cs Curriculum With With Aspect-Oriented Software Development (Aosd) And Early Experience, Konstantin Läufer, George K. Thiruvathukal, Tzilla Elrad Jan 2012

Enhancing The Cs Curriculum With With Aspect-Oriented Software Development (Aosd) And Early Experience, Konstantin Läufer, George K. Thiruvathukal, Tzilla Elrad

Konstantin Läufer

Aspect-oriented software development (AOSD) is evolving as an important step beyond existing software development approaches such as object-oriented development. An aspect is a module that captures a crosscutting concern, behavior that cuts across different units of abstraction in a software application; expressed as a module, such behavior can be enabled and disabled transparently and non-invasively, without changing the application code itself. Increasing industry demand for expertise in AOSD gives rise to the pedagogical challenge of covering this methodology and its foundations in the computer science curriculum. We present our curricular initiative to incorporate a novel course in AOSD in the …


A Model-Driven Approach To Job/Task Composition In Cluster Computing, Yogesh Kanitkar, Konstantin Läufer, Neeraj Mehta, George K. Thiruvathukal Jan 2012

A Model-Driven Approach To Job/Task Composition In Cluster Computing, Yogesh Kanitkar, Konstantin Läufer, Neeraj Mehta, George K. Thiruvathukal

Konstantin Läufer

In the general area of high-performance computing, object-oriented methods have gone largely unnoticed. In contrast, the Computational Neighborhood (CN), a framework for parallel and distributed computing with a focus on cluster computing, was designed from ground up to be object-oriented. This paper describes how we have successfully used UML in the following model-driven, generative approach to job/task composition in CN. We model CN jobs using activity diagrams in any modeling tool with support for XMI, an XML-based external representation of UML models. We then export the activity diagrams and use our XSLT-based tool to transform the resulting XMI representation to …


Natural Xml For Data Binding, Processing, And Persistence, George K. Thiruvathukal, Konstantin Läufer Jan 2012

Natural Xml For Data Binding, Processing, And Persistence, George K. Thiruvathukal, Konstantin Läufer

Konstantin Läufer

The article explains what you need to do to incorporate XML directly into your computational science application. The exploration involves the use of a standard parser to automatically build object trees entirely from application-specific classes. This discussion very much focuses on object-oriented programming languages such as Java and Python, but it can work for non-object-oriented languages as well. The ideas in the article provide a glimpse into the Natural XML research project.


Combining Soa And Bpm Technologies For Cross-System Process Automation, Sebastian Herr, John Shafaee, Konstantin Läufer, George K. Thiruvathukal, Guido Wirtz Jan 2012

Combining Soa And Bpm Technologies For Cross-System Process Automation, Sebastian Herr, John Shafaee, Konstantin Läufer, George K. Thiruvathukal, Guido Wirtz

Konstantin Läufer

This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges …


The Extreme Software Development Series: An Open Curricular Framework For Applied Capstone Courses, Konstantin Läufer, George K. Thiruvathukal Jan 2012

The Extreme Software Development Series: An Open Curricular Framework For Applied Capstone Courses, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We describe an open, flexible curricular framework for offering a collection of advanced undergraduate and graduate courses in software development. The courses offered within this framework are further unified by combining solid foundations with current technology and play the role of capstone courses in a modern software development track. Our initiative has been very successful with all stakeholders involved.


Restfs: Resources And Services Are Filesystems, Too, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Restfs: Resources And Services Are Filesystems, Too, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We have designed and implemented RestFS, a software frame-work that provides a uniform, configurable connector layerfor mapping remote web-based resources to local filesystem-based resources, recognizing the similarity between thesetwo types of resources. Such mappings enable programmaticaccess to a resource, as well as composition of two or moreresources, through the local operating system’s standardfilesystem application programming interface (API), script-able file-based command-line utilities, and inter-process com-munication (IPC) mechanisms. The framework supports au-tomatic and manual authentication. We include several ex-amples intended to show the utility and practicality of ourframework.


Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal Jan 2012

Naked Object File System (Nofs): A Framework To Expose An Object-Oriented Domain Model As A File System, Joseph P. Kaylor, Konstantin Läufer, George K. Thiruvathukal

Konstantin Läufer

We present Naked Objects File System (NOFS), a novel framework that allows a developer to expose a domain model as a file system by leveraging the Naked Objects design principle. NOFS allows a developer to construct a file system without having to understand or implement all details related to normal file systems development. In this paper we explore file systems frameworks and object-oriented frameworks in a historical context and present an example domain model using the framework. This paper is based on a fully-functional implementation that is distributed as free/open source software, including virtual machine images to demonstrate and study …


The Rock 2012, School Of Engineering And Computer Science Jan 2012

The Rock 2012, School Of Engineering And Computer Science

The Rock

No abstract provided.


Unification Modulo Theories Of Blind Signatures, Serdar Erbatur Jan 2012

Unification Modulo Theories Of Blind Signatures, Serdar Erbatur

Legacy Theses & Dissertations (2009 - 2024)

This thesis is concerned with equational unification problems that are relevant in formal verification of cryptographic protocols which deploy blind signature schemes. Blind signatures are signature schemes that keep the content confidential and have applications in modern cryptography for electronic voting and digital cash schemes. Equational unification problems studied here originate from blind RSA signatures and El Gamal encryption.


Equational Unification : Algorithms And Complexity With Applications To Cryptographic Protocol Analysis, Andrew Marshall Jan 2012

Equational Unification : Algorithms And Complexity With Applications To Cryptographic Protocol Analysis, Andrew Marshall

Legacy Theses & Dissertations (2009 - 2024)

The techniques and tools of unification theory have long been a core component of many


Characterizing Conflict In Wikipedia, Nathaniel Miller Jan 2012

Characterizing Conflict In Wikipedia, Nathaniel Miller

Mathematics, Statistics, and Computer Science Honors Projects

Wikipedia serves as the Internet's most widely viewed reference. In order to ensure its success, editors who create and maintain articles must resolve conflicts over appropriate article content. Previous research has measured Wikipedia conflict at two levels: single articles and categories of pages. I observe conflicts within small groups of articles, identifying their frequency, size, and intensity. Additionally, I identify individual conflicts spanning multiple articles and effects of conflict upon users' editing habits. I analyze cross-article conflict in three stages. First, I cluster a group of 1.4 million Wikipedia articles. Next, I find individual user conflicts within each article cluster …