Energy Management System For Renewable Energy, 2016 Utah State University
Energy Management System For Renewable Energy, Ashish R. Derhgawen
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
The demand for energy in our society has been increasing exponentially with our growing standard of living. The continued use of fossil fuels to meet these energy needs could lead to potentially catastrophic changes in the Earth's climate. Therefore, finding carbon-neutral energy sources and ensuring energy security are two of the biggest challenges that need to be addressed in the coming years. Recent technological innovations have finally brought us to the cusp of achieving these goals by providing cheap and reliable devices in micro-solar, smart homes , Internet of Things, etc. However, one of the biggest hurdles in the large-scale …
An Empirical Investigation Of Privacy And Security Concerns On Doctors’ And Nurses’ Behavioral Intentions To Use Rfid In Hospitals, 2016 Nova Southeastern University
An Empirical Investigation Of Privacy And Security Concerns On Doctors’ And Nurses’ Behavioral Intentions To Use Rfid In Hospitals, Thomas George Winston
CCE Theses and Dissertations
Radio frequency identification (RFID) technology is a useful technology that has myriad applications in technology, retail, manufacturing, and healthcare settings. Not dependent upon line-of-sight, RFID can scan devices in their proximity and report the information to connected (wired or other wireless) information systems. Once touted as the panacea for home healthcare, RFID devices can add benefit to patients in remote settings. RFID devices have been used to optimize systems in areas such as manufacturing and healthcare to expose inefficiencies in a system or process. Unlike manufacturing, however, RFID in healthcare settings presents security and privacy concerns to the people being …
Effective Teaching Practices In Online Higher Education, 2016 Nova Southeastern University
Effective Teaching Practices In Online Higher Education, Kim Mcmurtry
CCE Theses and Dissertations
In the context of continuing growth in online higher education in the United States, students are struggling to succeed, as evidenced by lower course outcomes and lower retention rates in online courses in comparison with face-to-face courses. The problem identified for investigation is how university instructors can ensure that effective teaching and learning is happening in their online courses. The research questions were:
- What are the best practices of effective online teaching in higher education according to current research?
- How do exemplary online instructors enact teaching presence in higher education?
- What are the best practices of effective online teaching in …
Algorithmic Foundations Of Heuristic Search Using Higher-Order Polygon Inequalities, 2016 Nova Southeastern University
Algorithmic Foundations Of Heuristic Search Using Higher-Order Polygon Inequalities, Newton Henry Campbell Jr.
CCE Theses and Dissertations
The shortest path problem in graphs is both a classic combinatorial optimization problem and a practical problem that admits many applications. Techniques for preprocessing a graph are useful for reducing shortest path query times. This dissertation studies the foundations of a class of algorithms that use preprocessed landmark information and the triangle inequality to guide A* search in graphs. A new heuristic is presented for solving shortest path queries that enables the use of higher order polygon inequalities. We demonstrate this capability by leveraging distance information from two landmarks when visiting a vertex as opposed to the common single landmark …
Aspect Mining Using Multiobjective Genetic Clustering Algorithms, 2016 Nova Southeastern University
Aspect Mining Using Multiobjective Genetic Clustering Algorithms, David G. Bethelmy
CCE Theses and Dissertations
In legacy software, non-functional concerns tend to cut across the system and manifest themselves as tangled or scattered code. If these crosscutting concerns could be modularized and the system refactored, then the system would become easier to understand, modify, and maintain. Modularized crosscutting concerns are known as aspects and the process of identifying aspect candidates in legacy software is called aspect mining.
One of the techniques used in aspect mining is clustering and there are many clustering algorithms. Current aspect mining clustering algorithms attempt to form clusters by optimizing one objective function. However, the objective function to be optimized tends …
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, 2016 Nova Southeastern University
Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson
CCE Theses and Dissertations
The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …
An Empirical Assessment Of Employee Cyberslacking In The Public Sector, 2016 Nova Southeastern University
An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández
CCE Theses and Dissertations
With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …
Mutable Class Design Pattern, 2016 Nova Southeastern University
Mutable Class Design Pattern, Nikolay Malitsky
CCE Theses and Dissertations
The dissertation proposes, presents and analyzes a new design pattern, the Mutable Class pattern, to support the processing of large-scale heterogeneous data models with multiple families of algorithms. Handling data-algorithm associations represents an important topic across a variety of application domains. As a result, it has been addressed by multiple approaches, including the Visitor pattern and the aspect-oriented programming (AOP) paradigm. Existing solutions, however, bring additional constraints and issues. For example, the Visitor pattern freezes the class hierarchies of application models and the AOP-based projects, such as Spring AOP, introduce significant overhead for processing large-scale models with fine-grain objects. The …
A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, 2016 Nova Southeastern University
A Study Of The Success Of Group Formation In Virtual Teams Using Computer-Mediated Communications, Eliel Melón-Ramos
CCE Theses and Dissertations
In the digital domain, virtual teams within organizations and corporations are becoming common. Restructuring an organization or corporation is vital because competition and globalization are increasing. In this era of globalization, distributed working groups need to develop a competitive advantage in these ever-changing environments. Historically, teams had experienced problems stemming from geographical and temporal limitations. With the increase of technology in telecommunications, organizations are increasingly forming virtual teams, which have become critical to the survival of nearly any corporate entity.
Virtual teams have some of the same problems that regular teams have. One of the key challenges is the method …
An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, 2016 Nova Southeastern University
An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye
CCE Theses and Dissertations
The proliferation of information systems (IS) over the past decades has increased the demand for system authentication. While the majority of system authentications are password-based, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user to ensure their passwords are more complex and consequently stronger. In addition to meeting a certain complexity threshold, the password must also be changed on a regular basis. As the cognitive load increases on the employees using complex passwords and changing them often, they may have difficulty recalling their passwords. As such, the …
Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, 2016 Nova Southeastern University
Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, Julie E. Hewitt
CCE Theses and Dissertations
Adjunct faculty comprise a large percentage of part-time faculty for many colleges and universities today. Adjunct faculty are hired because they are experts in their content areas; however, this does not guarantee that they are skilled in effective classroom management. These instructors can become bewildered and frustrated because they lack the knowledge and skills that are needed to run an effective classroom.
While educational organizations have adopted blended learning environments as an effective delivery method for their students, this method has not gained much traction as a way to deliver instruction to their own employees. Thus, there are opportunities to …
An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, 2016 Nova Southeastern University
An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin
CCE Theses and Dissertations
Studies have revealed that securing Information Systems (IS) from intentional misuse is a concern among organizations today. The use of Web-based systems has grown dramatically across industries including e-commerce, e-banking, e-government, and e learning to name a few. Web-based systems provide e-services through a number of diverse activities. The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various …
Enhanced Method Call Tree For Comprehensive Detection Of Symptoms Of Cross Cutting Concerns, 2016 Nova Southeastern University
Enhanced Method Call Tree For Comprehensive Detection Of Symptoms Of Cross Cutting Concerns, Saleem Obaidullah Mir
CCE Theses and Dissertations
Aspect oriented programming languages provide a new enhanced composition mechanism between the functional sub units as compared to earlier non aspect oriented languages. For this reason the refactoring process requires a new approach to the analysis of existing code that focuses on how the functions cross cut one another. Aspect mining is a process of studying an existing program in order to find these cross cutting functions or concerns so they may be implemented using new aspect oriented constructs and thus reduce the complexity of the existing code. One approach to the detection of these cross cutting concerns generates a …
Community College Faculty Dispositions Towards Blended Learning, 2016 Nova Southeastern University
Community College Faculty Dispositions Towards Blended Learning, Robin A. Hill
CCE Theses and Dissertations
Community colleges are being encouraged to find and provide access to higher education by offering more flexible course delivery methods to meet the needs of their diverse student body. At the same time, these institutions must retain their quality of instruction, accountability for learning outcomes, and institutional obligations. Blended learning, where students attend class both on campus and online, is promoted as one solution for attaining such goals. Among the four-year undergraduate population, blended learning has been shown to support student success, meet diverse learning styles, and meet institutional obligations; however, research within the community college population is limited. In …
A Big Idea: The Rollout Of Open Suny, 2016 Nova Southeastern University
A Big Idea: The Rollout Of Open Suny, Karen E. Case
CCE Theses and Dissertations
Leveraging technology may be a viable solution in the higher education industry as enrollments decline and institutions have a hard time meeting their projected budgets. One innovative approach to mitigating this problem was approved in March of 2013 by the Board of Trustees of the State University of New York (SUNY). It is called Open SUNY. Open SUNY consists of nine components: the creation and expansion of online programs to meet workforce development needs, the development of online credit-bearing experiential learning experiences, support for training of faculty who opt to use emerging technologies, support for student access to online courses, …
Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, 2016 Nova Southeastern University
Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, David Moskowitz
CCE Theses and Dissertations
Soft methods of artificial intelligence are often used in the prediction of non-deterministic time series that cannot be modeled using standard econometric methods. These series, such as occur in finance, often undergo changes to their underlying data generation process resulting in inaccurate approximations or requiring additional human judgment and input in the process, hindering the potential for automated solutions.
Genetic programming (GP) is a class of nature-inspired algorithms that aims to evolve a population of computer programs to solve a target problem. GP has been applied to time series prediction in finance and other domains. However, most GP-based approaches to …
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, 2016 Nova Southeastern University
An Analysis Of The Relationship Between Security Information Technology Enhancements And Computer Security Breaches And Incidents, Linda Betz
CCE Theses and Dissertations
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over the past few years, there is a pattern of the adversary being inside …
The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, 2016 Nova Southeastern University
The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, Jason Alan Pittman
CCE Theses and Dissertations
There is a significant gap in the body of knowledge concerning time-compressed multimedia instruction. Although research indicates that there is no loss in learning through well-designed multimedia instruction compressed at 25%, research is lacking that analyzes the effects of time-compression with learner-control included in the multimedia instruction. The aim of the study was to address this gap in the research by integrating learner-control into the interface of a time-compressed multimedia instructional lesson using similar methodologies from previous research.
Effects were analyzed of time-compressed learner-controlled multimedia instruction on learning and perceived cognitive load. Additionally, the researcher employed a participant population from …
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, 2016 Nova Southeastern University
An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.
CCE Theses and Dissertations
Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …
Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, 2016 Nova Southeastern University
Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti
CCE Theses and Dissertations
Agile software engineering has been a popular methodology to develop software rapidly and efficiently. However, the Agile methodology often favors Functional Requirements (FRs) due to the nature of agile software development, and strongly neglects Non-Functional Requirements (NFRs). Neglecting NFRs has negative impacts on software products that have resulted in poor quality and higher cost to fix problems in later stages of software development.
This research developed the CEP “Capture Elicit Prioritize” methodology to effectively gather NFRs metadata from software requirement artifacts such as documents and images. Artifact included the Optical Character Recognition (OCR) artifact which gathered metadata from images. The …