Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 421 - 450 of 469

Full-Text Articles in Databases and Information Systems

Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop Jan 2005

Non-Verbal Communication With Autistic Children Using Digital Libraries, Gondy A. Leroy, John Huang '05, Serena Chuang '05, Marjorie H. Charlop

CGU Faculty Publications and Research

Autism spectrum disorder (ASD) has become one of the most prevalent mental disorders over the last few years and its prevalence is still growing. The disorder is characterized by a wide variety of symptoms such as lack of social behavior, extreme withdrawal, and problems communicating. Because of the diversity in symptoms and the wide variety in severity for those, each autistic child has different needs and requires individualized therapy. This leads to long waiting lists for therapy.


Jess – A Java Security Scanner For Eclipse, Russell Spitler Jan 2005

Jess – A Java Security Scanner For Eclipse, Russell Spitler

Honors Theses

Secure software is the responsibility of every developer. In order to help a developer with this responsibility there are many automated source code security auditors. These tools perform a variety of functions, from finding calls to insecure functions to poorly generated random numbers. These programs have existed for years and perform the security audit with varying degrees of success.

Largely missing in the world of programming is such a security auditor for the Java programming language. Currently, Fortify Software produces the only Java source code security auditor; this is a commercially available package.

This void is what inspired JeSS, Java …


Modified Art 2a Growing Network Capable Of Generating A Fixed Number Of Nodes, Ji He, Ah-Hwee Tan, Chew-Lim Tan May 2004

Modified Art 2a Growing Network Capable Of Generating A Fixed Number Of Nodes, Ji He, Ah-Hwee Tan, Chew-Lim Tan

Research Collection School Of Computing and Information Systems

This paper introduces the Adaptive Resonance Theory under Constraint (ART-C 2A) learning paradigm based on ART 2A, which is capable of generating a user-defined number of recognition nodes through online estimation of an appropriate vigilance threshold. Empirical experiments compare the cluster validity and the learning efficiency of ART-C 2A with those of ART 2A, as well as three closely related clustering methods, namely online K-Means, batch K-Means, and SOM, in a quantitative manner. Besides retaining the online cluster creation capability of ART 2A, ART-C 2A gives the alternative clustering solution, which allows a direct control on the number of output …


Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee Mar 2004

Swarm Based Implementation Of A Virtual Distributed Database System In A Sensor Network, Wen C. Lee

Theses and Dissertations

The deployment of unmanned aerial vehicles (UAVs) in recent military operations has had success in carrying out surveillance and combat missions in sensitive areas. An area of intense research on UAVs has been on controlling a group of small-sized UAVs to carry out reconnaissance missions normally undertaken by large UAVs such as Predator or Global Hawk. A control strategy for coordinating the UAV movements of such a group of UAVs adopts the bio-inspired swarm model to produce autonomous group behavior. This research proposes establishing a distributed database system on a group of swarming UAVs, providing for data storage during a …


Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner Jan 2004

Resource Harvesting Within The Oai-Pmh Framework, Herbert Van De Sompel, Michael L. Nelson, Carl Lagoze, Simeon Warner

Computer Science Faculty Publications

Motivated by preservation and resource discovery, we examine how digital resources, and not just metadata about resources, can be harvested using the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). We review and critique existing techniques for identifying and gathering digital resources using metadata harvested through the OAI-PMH. We introduce an alternative solution that builds on the introduction of complex object formats that provide a more accurate way to describe digital resources. We argue that the use of complex object formats as OAI-PMH metadata formats results in a reliable and attractive approach for incremental harvesting of resources using the OAI-PMH.


Development Of A Systems Engineering Model For Chemical Separation Process, Lijian Sun Dec 2003

Development Of A Systems Engineering Model For Chemical Separation Process, Lijian Sun

UNLV Theses, Dissertations, Professional Papers, and Capstones

This thesis is concerned with the efforts to develop a general-purpose systems engineering model software TRPSEMPro1 that can be used to improve productivity in the design process. Different features of TRPSEMPro will be presented in this thesis. First, Systems Engineering technology is presented, followed by the exposition of different numerical optimization technologies and DOE (Design of Experiments) study technologies. Second, the detailed software process, Object-Oriented Analysis and Design (OOA&D) for the TRPSEMPro is presented. All the design data models are expressed by using Unified Modeling Language (UML).

AMUSESimulator is another software package which has been designed and implemented in order …


Guest Editorial: Text And Web Mining, Ah-Hwee Tan, Philip S. Yu May 2003

Guest Editorial: Text And Web Mining, Ah-Hwee Tan, Philip S. Yu

Research Collection School Of Computing and Information Systems

Text mining and web mining are two interrelated fields that have received a lot of attention in recent years. Text mining [1, 2] is concerned with the analysis of very large document collections and the extraction of hidden knowledge from text-based data. Web mining [3] refers to the analysis and mining of all web-related data, including web content, hyperlink structure, and web access statistics.


Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell Jan 2003

Crafting A Research Paper, Ronan Fitzpatrick, Kevin O'Donnell

Conference papers

Writing research papers presents numerous different challenges, which vary from how to layout the various pages and format the text to what to include in the different sections that make up the paper. In order to clarify these issues this paper sets out guidelines and best practice approaches and demonstrates their use in the style of this paper.


Proteome Database Of Hepatocellular Carcinoma., Cynthia Liang, Jason Neo, Siaw Ling Lo, Gek San Tan, Teck Keong Seow, Maxey Chung May 2002

Proteome Database Of Hepatocellular Carcinoma., Cynthia Liang, Jason Neo, Siaw Ling Lo, Gek San Tan, Teck Keong Seow, Maxey Chung

Research Collection School Of Computing and Information Systems

Hepatocellular carcinoma (HCC or hepatoma) is the most common primary cancer of the liver. Persistent viral infection by the hepatic B or C virus is probably the most important cause of HCC worldwide. It is responsible for approximately one million deaths each year, predominantly in the underdeveloped and developing countries, but its incidence is also on the rise in the developed countries. For most patients suffering from HCC, long-term survival is rare, as they are presented late and are often unsuitable for curative treatment. Thus there is great interest to identify novel HCC diagnostic markers for early detection of the …


Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim Dec 2001

Automated Online News Classification With Personalization, Chee-Hong Chan, Aixin Sun, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Classification of online news, in the past, has often been done manually. In our proposed Categorizor system, we have experimented an automated approach to classify online news using the Support Vector Machine (SVM). SVM has been shown to deliver good classification results when ample training documents are given. In our research, we have applied SVM to personalized classification of online news.


Infosphere Project: An Overview, Calton Pu, Jonathan Walpole Mar 2001

Infosphere Project: An Overview, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

We describe the Infosphere project, which is building the systems software support for information-driven applications such as digital libraries and electronic commerce. The main technical contribution is the Infopipe abstraction to support information flow with quality of service. Using building blocks such as program specialization, software feedback, domain-specific languages, and personalized information filtering, the Infopipe software generates code and manage resources to provide the specified quality of service with support for composition and restructuring.


Data Warehouse Techniques To Support Global On-Demand Weather Forecast Metrics, Meriellen C. Joga Mar 2000

Data Warehouse Techniques To Support Global On-Demand Weather Forecast Metrics, Meriellen C. Joga

Theses and Dissertations

Air Force pilots and other operators make crucial mission planning decisions based on weather forecasts; therefore, the ability to forecast the weather accurately is a critical issue to Air Force Weather (AFW) and its customers. The goal of this research is to provide Air Force Weather with a methodology to automate statistical data analysis for the purpose of providing on-demand metrics. A data warehousing methodology is developed and applied to the weather metrics problem in order to present an option that will facilitate on-demand metrics. On-line analytical processing (OLAP) and data mining solutions are also discussed.


The Ups Prototype: An Experimental End-User Service Across E-Print Archives, Herbert Van De Sompel, Thomas Krichel, Michael L. Nelson, Patrick Hochstenbach, Victor Lyapunov, Kurt Maly, Mohammad Zubair, Mohamed Kholief, Xiaoming Liu, Heath O'Connell Jan 2000

The Ups Prototype: An Experimental End-User Service Across E-Print Archives, Herbert Van De Sompel, Thomas Krichel, Michael L. Nelson, Patrick Hochstenbach, Victor Lyapunov, Kurt Maly, Mohammad Zubair, Mohamed Kholief, Xiaoming Liu, Heath O'Connell

Computer Science Faculty Publications

A meeting was held in Santa Fe, New Mexico, October 21-22, 1999, to generate discussion and consensus about interoperability of publicly available scholarly information archives. The invitees represented several well known e-print and report archive initiatives, as well as organizations with interests in digital libraries and the transformation of scholarly communication. The central goal of the meeting was to agree on recommendations that would make the creation of end-user services -- such as scientific search engines and linking systems -- for data originating from distributed and dissimilar archives easier. The Universal Preprint Service (UPS) Prototype was developed in preparation for …


Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan Jan 2000

Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Supervised Adaptive Resonance Theory is a family of neural networks that performs incremental supervised learning of recognition categories (pattern classes) and multidimensional maps of both binary and analog patterns. This chapter highlights that the supervised ART architecture is compatible with IF-THEN rule-based symbolic representation. Specifi­cally, the knowledge learned by a supervised ART system can be readily translated into rules for interpretation. Similarly, a priori domain knowl­edge in the form of IF-THEN rules can be converted into a supervised ART architecture. Not only does initializing networks with prior knowl­edge improve predictive accuracy and learning efficiency, the inserted symbolic knowledge can also …


Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page Mar 1999

Incorporating Scene Mosaics As Visual Indexes Into Uav Video Imagery Databases, Timothy I. Page

Theses and Dissertations

The rise of large digital video archives has strengthened the need for more efficient ways of indexing video files an accessing the information contained in them. Reconnaissance platforms, such as the Predator UAV, are contributing thousands of hours of video footage that require analysis, storage, and retrieval. A process is proposed for converting a video stream into a series of mosaic and selected still images that provide complete coverage of the original video. The video mosaic images can be utilized as visual indexes into a video database. In addition, mosaic images contain information from an entire sequence of video frames …


Search For Charged Higgs Bosons In E+E- Collisions At √S = 181-184 Gev, Barate, R.; Et Al., M. Thulasidas Jan 1999

Search For Charged Higgs Bosons In E+E- Collisions At √S = 181-184 Gev, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

No abstract provided.


Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer Jan 1999

Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer

Theses

Software components representing business entities like customer or purchase order introduce a new way of Online Transaction Processing to business applications. Collaborating business objects allow to complete whole business processes as a single distributed transaction, instead of dividing it into queued steps, which sometimes even require user intervention. This IS due to the fact that business objects contain both business data and logic and that they incorporate multiple databases from different vendors and different geographic locations in a single transaction.

Business objects cannot be used as stand-alone components, but require a framework of services that manage persistence, concurrent transactions, and …


Searches For The Neutral Higgs Bosons Of The Mssm In E+E- Collisions At Centre-Of-Mass Energies Of 181-184 Gev, Barate, R.; Et Al., M. Thulasidas Nov 1998

Searches For The Neutral Higgs Bosons Of The Mssm In E+E- Collisions At Centre-Of-Mass Energies Of 181-184 Gev, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

The data collected by ALEPH at LEP at centre-of-mass energies ranging from 181 to 184 GeV, corresponding to an integrated luminosity of 57 pb−1, are analysed to search for pair-produced neutral Higgs bosons h and A, in the bb̄bb̄ and τ+τ−bb̄ final states. Two events are found in the data with 2.5 expected from standard model processes. When combined with the lower energy data collected by ALEPH and with earlier reported searches for associated hZ production, these analyses are interpreted in the context of the minimal supersymmetric extension of the standard model (MSSM). For standard choices of MSSM parameter sets, …


Validation Of Waimss Incident Duration Estimation Model, Wei Wu, Pushkin Kachroo, Kaan Ozbay Oct 1998

Validation Of Waimss Incident Duration Estimation Model, Wei Wu, Pushkin Kachroo, Kaan Ozbay

Electrical & Computer Engineering Faculty Research

This paper presents an effort to validate the traffic incident duration estimation model of WAIMSS (wide area incident management support system). Duration estimation model of WAIMSS predicts the incident duration based on an estimation tree which was calibrated using incident data collected in Northern Virginia. Due to the limited sample size, a full scale test of the distribution, mean and variance of incident duration was performed only for the root node of the estimation tree, white only mean tests were executed at all other nodes whenever a data subset was available. Further studies were also conducted on the model error …


Wide-Area Incident Management System On The Internet, Kaan Ozbay, Pushkin Kachroo Oct 1998

Wide-Area Incident Management System On The Internet, Kaan Ozbay, Pushkin Kachroo

Electrical & Computer Engineering Faculty Research

The incident management process consists of four sequential steps-incident detection, response, clearance and recovery. Each of these components comprises of a number of operations and coordinated decision-making between the agencies involved. The provision of computer based support tools for the personnel involved will help develop appropriate strategies and increase efficiency and expediency. Existing systems are developed on various traditional computing platforms. However, with the advent of World Wide Web and Internet based programming tools such as Java, it is now possible to develop platform independent decision support tools for the incident management agencies. Any agency will be able to use …


Scalar Quark Searches In E+E- Collisions At √S = 181 - 184 Gev, Barate, R.; Et Al., M. Thulasidas Aug 1998

Scalar Quark Searches In E+E- Collisions At √S = 181 - 184 Gev, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for scalar top, scalar bottom and degenerate scalar quarks have been performed with data collected with the ALEPH detector at LEP. The data sample consists of 57 pb−1 taken at s = 181–184 GeV. No evidence for scalar top, scalar bottom or degenerate scalar quarks was found in the channels t̃→cχ, t̃→bℓν̃, b̃→bχ, and q̃→qχ. From the channel t̃→cχ a limit of 74 GeV/c2has been set on the scalar top quark mass, independent of the mixing angle. This limit assumes a mass difference between the t̃ and the χ in the range 10–40 GeV/c2. From the channel t̃→bℓν̃ the …


Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas Nov 1997

Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for scalar top and bottom quarks have been performed with data collected by the ALEPH detector at LEP. The data sample consists of 21.7 pb−1 taken at √ s = 161, 170, and 172 GeV and 5.7 pb−1 taken at √ s = 130 and 136 GeV. No evidence for scalar top quarks or scalar bottom quarks was found in the channels ˜t → cχ, ˜t → bℓν˜, and b˜ → bχ. For the channel ˜t → cχ a limit of 67 GeV/c 2 has been set on the scalar top quark mass, independent of the mixing angle between …


A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas Sep 1997

A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Using data collected from 1992 to 1995 with the ALEPH detector at LEP, a measurement of the colour factor ratios CA/CF and TF /CF and the strong coupling constant αs = CFαs(MZ)/(2π) has been performed by fitting theoretical predictions simultaneously to the measured differential two-jet rate and angular distributions in four-jet events. The result is found to be in excellent agreement with QCD, {fx4-1} Fixing CA/CF and TF/CF to the QCD values permits a determination of αs(MZ) and ηf, the number of active flavours. With this measurement the existence of a gluino with mass below 6.3 GeV/c2 is excluded at …


Investigating The Use Of Kalman Filtering Approaches For Dynamic Origin-Destination Trip Table Estimation, Pushkin Kachroo, Kaan Ozbay, Arvind Narayanan Apr 1997

Investigating The Use Of Kalman Filtering Approaches For Dynamic Origin-Destination Trip Table Estimation, Pushkin Kachroo, Kaan Ozbay, Arvind Narayanan

Electrical & Computer Engineering Faculty Research

This paper studies the applicability of Kalman filtering approaches for network wide traveler origin-destination estimation from link traffic volumes. The paper evaluates the modeling assumptions of the Kalman filters and examines the implications of such assumptions.


Feedback Control Solutions To Network Level User-Equilibrium Real-Time Dynamic Traffic Assignment Problems, Pushkin Kachroo, Kaan Ozbay Apr 1997

Feedback Control Solutions To Network Level User-Equilibrium Real-Time Dynamic Traffic Assignment Problems, Pushkin Kachroo, Kaan Ozbay

Electrical & Computer Engineering Faculty Research

A new method for performing dynamic traffic assignment (DTA) is presented which is applicable in real time, since the solution is based on feedback control. This method employs the design of nonlinear H∞ feedback control systems which is robust to certain class of uncertainties in the system. The solution aims at achieving user equilibrium on alternate routes in a network setting.


Measurement Of The Spectral Functions Of Vector Current Hadronic Tau Decays, R. Barate, M. Thulasidas Jan 1997

Measurement Of The Spectral Functions Of Vector Current Hadronic Tau Decays, R. Barate, M. Thulasidas

Research Collection School Of Computing and Information Systems

A measurement of the spectral functions of non-strange τ vector current final states is presented, using 124 358 τ pairs recorded by the ALEPH detector at LEP during the years 1991 to 1994. The spectral functions of the dominant two- and four-pion τ decay channels are compared to published results of e + e - annihilation experiments via isospin rotation. A combined fit of the pion form factor from τ decays and e + e - data is performed using different parametrizations. The mass and the width of the ρ ±(770) and the ρ 0(770) are separately determined in order …


A Study Of Τ Decays Involving Η And Ω Mesons, D. Buskulic, M. Thulasidas Jan 1997

A Study Of Τ Decays Involving Η And Ω Mesons, D. Buskulic, M. Thulasidas

Research Collection School Of Computing and Information Systems

The 132 pbt - 1 of data collected by ALEPH from 1991 to 1994 have been used to analyze η and ω production in τ decays. The following branching fractions have been measured: B(τ−→ντωh−)=(1.91±0.07±0.06)×10−2,B(τ−→ντωh−)=(1.91±0.07±0.06)×10−2, B(τ−→ντωh−π0)=(4.3±0.6±0.5)×10−3,B(τ−→ντωh−π0)=(4.3±0.6±0.5)×10−3, B(τ−→ντηK−)=(2.9+1.3−1.2±0.7)×10−4,B(τ−→ντηK−)=(2.9−1.2+1.3±0.7)×10−4, B(τ−→ντηh−π0)=(1.8±0.4±0.2)×10−3B(τ−→ντηh−π0)=(1.8±0.4±0.2)×10−3 and the 95% C.L. limit B(τ− → ντηπt -) t - 4 has been obtained. The ωπt- and ηπt -π0 rates and dynamics are found in agreement with the predictions made from e+e∼ - annihilation data with the help of isospin invariance (CVC).


Mass Limit For The Standard Model Higgs Boson With The Full Lep I Aleph Data Sample, Buskulic, D.; Et Al., M. Thulasidas Sep 1996

Mass Limit For The Standard Model Higgs Boson With The Full Lep I Aleph Data Sample, Buskulic, D.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

The reaction e+e− → HZ∗ is used to search for the standard model Higgs boson in the Hνν and the Hℓ+ℓ− channels. The data sample corresponds to about 4.5 million hadronic Z decays collected by the ALEPH experiment at LEP from 1989 to 1995 at centre-of-mass energies at and around the Z peak. Three candidate events are found in the Hμ+μ− channel, in agreement with the expected background from the electroweak process e+e− ℓ+ℓ−qq. This search results in a 95% C.L. lower limit on the Higgs boson mass of 63.9 GeV/c2.


Search For Charginos And Neutralinos With R-Parity Violation At √S = 130 And 136 Gev, Buskulic, D.; Et Al., M. Thulasidas Sep 1996

Search For Charginos And Neutralinos With R-Parity Violation At √S = 130 And 136 Gev, Buskulic, D.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for charginos and neutralinos produced in e +e - collisions at centre-of-mass energies of 130 and 136 GeV have been performed under the assumptions that R-parity is not conserved, that the dominant R-parity violating coupling involves only leptonic fields, and that the lifetime of the lightest supersymmetric particle can be neglected. In the 5.7 pb -1 data sample collected by ALEPH, no candidate events were found. As a result, chargino and neutralino masses and couplings are constrained and the domains previously excluded at LEP1 are extended.


Search For Cp Violation In The Decay Z → B B̄ G, Buskulic, D.; Et Al., M. Thulasidas Sep 1996

Search For Cp Violation In The Decay Z → B B̄ G, Buskulic, D.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

About three million hadronic decays of the Z collected by ALEPH in the years 1991 to 1994 are used to search for anomalous CP violation beyond the Standard Model in the decay Z → bb̄g. The study is performed by analyzing angular correlations between the two quarks and the gluon in three-jet events and by measuring the differential two-jet rate. No signal of CP violation is found. For the combinations of anomalous CP violating couplings, ĥb = ĥAbgVh - ĥVbgAb and hb* = √ĥVb2 + ĥAb2, limits of | ĥb | b*