Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 2461 - 2490 of 6720
Full-Text Articles in Physical Sciences and Mathematics
My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos
My.Eskwela: Designing An Enterprise Learning Management System To Increase Social Network And Reduce Cognitive Load, Ma. Regina Justina E. Estuar, Orven E. Llantos
Department of Information Systems & Computer Science Faculty Publications
A typical learning management system (LMS) provides a tool for teachers to upload and create links to resources, create online assessments and provide immediate evaluation to students. As much as it tries to be student centered, most LMS remains a tool for instruction rather than learning. In a learning generation that is bound by very high online social capital, connectedness to the family weakens. my.Eskwela (My School) redefines LMS to include a parent component to address the need for inclusive participation of parents in the teaching-learning process. Basis for re-design came from the low user acceptance of teachers in using …
The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio
The Efficacy Of An Emr-Enabled Text Messaging System To The Expanded Health Beliefs, Diabetes Care Profile And Hba1c Of Diabetes Mellitus Patients, Ma. Regina Justina E. Estuar, John Noel Victorino, Razel Custodio
Department of Information Systems & Computer Science Faculty Publications
As diabetes mellitus (DM) becomes a global emergency, there is a need to explore novel interventions to address problems in self – management. Literature agree in the potential of mobile phones to carry-out self-care for a wide-array of disease conditions. Diabetes Self – Management Support and Education Through Text – Messaging (DSMSET) is a low-cost, two-way text messaging system designed to deliver self - help, educational messages based on the nine (9) dimensions of health management. DSMSET serves as a plugin to SHINE OS+, an open – source electronic medical record (EMR) system. The research is also based on the …
Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan
Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan
CCE Theses and Dissertations
Complete coverage relies on a path planning algorithm that will move one or more robots, including the actuator, sensor, or body of the robot, over the entire environment. Complete coverage of an unknown environment is used in applications like automated vacuum cleaning, carpet cleaning, lawn mowing, chemical or radioactive spill detection and cleanup, and humanitarian de-mining.
The environment is typically decomposed into smaller areas and then assigned to individual robots to cover. The robots typically use the Boustrophedon motion to cover the cells. The location and size of obstacles in the environment are unknown beforehand. An online algorithm using sensor-based …
Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Client-Assisted Memento Aggregation Using The Prefer Header, Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
[First paragraph] Preservation of the Web ensures that future generations have a picture of how the web was. Web archives like Internet Archive's Wayback Machine, WebCite, and archive.is allow individuals to submit URIs to be archived, but the captures they preserve then reside at the archives. Traversing these captures in time as preserved by multiple archive sources (using Memento [8]) provides a more comprehensive picture of the past Web than relying on a single archive. Some content on the Web, such as content behind authentication, may be unsuitable or inaccessible for preservation by these organizations. Furthermore, this content may be …
Evaluating A Cluster Of Low-Power Arm64 Single-Board Computers With Mapreduce, Daniel Mcdermott
Evaluating A Cluster Of Low-Power Arm64 Single-Board Computers With Mapreduce, Daniel Mcdermott
EWU Masters Thesis Collection
With the meteoric rise of enormous data collection in science, industry, and the cloud, methods for processing massive datasets have become more crucial than ever. MapReduce is a restricted programing model for expressing parallel computations as simple serial functions, and an execution framework for distributing those computations over large datasets residing on clusters of commodity hardware. MapReduce abstracts away the challenging low-level synchronization and scalability details which parallel and distributed computing often necessitate, reducing the concept burden on programmers and scientists who require data processing at-scale. Typically, MapReduce clusters are implemented using inexpensive commodity hardware, emphasizing quantity over quality due …
Exploratory Reconstructability Analysis Of Accident Tbi Data, Martin Zwick, Nancy Ann Carney, Rosemary Nettleton
Exploratory Reconstructability Analysis Of Accident Tbi Data, Martin Zwick, Nancy Ann Carney, Rosemary Nettleton
Systems Science Faculty Publications and Presentations
This paper describes the use of reconstructability analysis to perform a secondary study of traumatic brain injury data from automobile accidents. Neutral searches were done and their results displayed with a hypergraph. Directed searches, using both variable-based and state-based models, were applied to predict performance on two cognitive tests and one neurological test. Very simple state-based models gave large uncertainty reductions for all three DVs and sizeable improvements in percent correct for the two cognitive test DVs which were equally sampled. Conditional probability distributions for these models are easily visualized with simple decision trees. Confounding variables and counter-intuitive findings are …
Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu
Skylens: Visual Analysis Of Skyline On Multi-Dimensional Data, Xun Zhao, Yanhong Wu, Weiwei Cui, Xinnan Du, Yuan Chen, Yong Wang, Dik Lun Lee, Huamin Qu
Research Collection School Of Computing and Information Systems
Skyline queries have wide-ranging applications in fields that involve multi-criteria decision making, including tourism, retail industry, and human resources. By automatically removing incompetent candidates, skyline queries allow users to focus on a subset of superior data items (i.e.. the skyline), thus reducing the decision-making overhead. However, users are still required to interpret and compare these superior items manually before making a successful choice. This task is challenging because of two issues. First, people usually have fuzzy, unstable, and inconsistent preferences when presented with multiple candidates. Second, skyline queries do not reveal the reasons for the superiority of certain skyline points …
Blockchain: A New Type Of Database, Brent Marshall
Blockchain: A New Type Of Database, Brent Marshall
A with Honors Projects
The blockchain is a new technology that seems to have people all over the world talking about it. But what is it? And what can it do? This paper will explore both the current uses of block chain technology and its potential uses. We will begin with definitions, followed by the history and uses of blockchains.
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook
Copyright, Fair Use, Scholarly Communication, etc.
The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …
An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas
An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas
Engineering Management & Systems Engineering Faculty Publications
Inter-rater reliability can be regarded as the degree of agreement among raters on a given item or a circumstance. Multiple approaches have been taken to estimate and improve inter-rater reliability of the United States Department of Defense Human Factors Analysis and Classification System used by trained accident investigators. In this study, three trained instructor pilots used the DoD-HFACS to classify 347 U.S. Air Force Accident Investigation Board (AIB) Class-A reports between the years of 2000 and 2013. The overall method consisted of four steps: (1) train on HFACS definitions, (2) verify rating reliability, (3) rate HFACS reports, and (4) random …
Research Agenda In Developing Core Reference Ontology For Human Intelligence/Machine-Intelligence Electronic Medical Records System, Ziniya Zahedi, Teddy Steven Cotter
Research Agenda In Developing Core Reference Ontology For Human Intelligence/Machine-Intelligence Electronic Medical Records System, Ziniya Zahedi, Teddy Steven Cotter
Engineering Management & Systems Engineering Faculty Publications
Beginning around 1990, efforts were initiated in the medical profession by the U.S. government to transition from paper based medical records to electronic medical records (EMR). By the late 1990s, EMR implementation had already encountered multiple barriers and failures. Then President Bush set forth the goal of implementing electronic health records (EHRs), nationwide within ten years. Again, progress toward EMR implementation was not realized. President Obama put new emphasis on promoting EMR and health care technology. The renewed emphasis did not overcome many of the original problems and induced new failures. Retrospective analyses suggest that failures were induced because programmers …
Collaboration Patterns In Software Developer Network, Didi Surian, Ee-Peng Lim, David Lo
Collaboration Patterns In Software Developer Network, Didi Surian, Ee-Peng Lim, David Lo
Research Collection School Of Computing and Information Systems
In this entry, we mine collaboration patterns from a large software developer network (Surian et al. 2010). We consider high- and low-level patterns. High-level patterns correspond to various network-level statistics that we observe to hold in this network. Low-level patterns are topological subgraph patterns that are frequently observed among developers collaborating in the network. Mining topological subgraph patterns are difficult as it is an NP-hard problem. To address this issue, we use a combination of frequent subgraph mining and graph matching by leveraging the power law property exhibited by a large collaboration graph. The technique is applicable to any software …
Multi-Target Deep Neural Networks: Theoretical Analysis And Implementation, Zeng Zeng, Nanying Liang, Xulei Yang, Steven C. H. Hoi
Multi-Target Deep Neural Networks: Theoretical Analysis And Implementation, Zeng Zeng, Nanying Liang, Xulei Yang, Steven C. H. Hoi
Research Collection School Of Computing and Information Systems
In this work, we propose a novel deep neural network referred to as Multi-Target Deep Neural Network (MT-DNN). We theoretically prove that different stable target models with shared learning paths are stable and can achieve optimal solutions respectively. Based on GoogleNet, we design a single model with three different targets, one for classification, one for regression, and one for masks that is composed of 256 × 256 sub-models. Unlike bounding boxes used in ImageNet, our single model can draw the shapes of target objects, and in the meanwhile, classify the objects and calculate their sizes. We validate our single MT-DNN …
Swimming In A Sea Of Javascript Or: How I Learned To Stop Worrying And Love High-Fidelity Replay, John A. Berlin, Michael L. Nelson, Michele C. Weigle
Swimming In A Sea Of Javascript Or: How I Learned To Stop Worrying And Love High-Fidelity Replay, John A. Berlin, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
[First paragraph] Preserving and replaying modern web pages in high-fidelity has become an increasingly difficult task due to the increased usage of JavaScript. Reliance on server-side rewriting alone results in live-leakage and or the inability to replay a page due to the preserved JavaScript performing an action not permissible from the archive. The current state-of-the-art high fidelity archival preservation and replay solutions rely on handcrafted client-side URL rewriting libraries specifically tailored for the archive, namely Webrecoder's and Pywb's wombat.js [12]. Web archives not utilizing client-side rewriting rely on server-side rewriting that misses URLs used in a manner not accounted for …
It Is Hard To Compute Fixity On Archived Web Pages, Mohamed Aturban, Michael L. Nelson, Michele C. Weigle
It Is Hard To Compute Fixity On Archived Web Pages, Mohamed Aturban, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
[Introduction] Checking fixity in web archives is performed to ensure archived resources, or mementos (denoted by URI-M) have remained unaltered since when they were captured. The final report of the PREMIS Working Group [2] defines information used for fixity as "information used to verify whether an object has been altered in an undocumented or unauthorized way." The common technique for checking fixity is to generate a current hash value (i.e., a message digest or a checksum) for a file using a cryptographic hash function (e.g., SHA-256) and compare it to the hash value generated originally. If they have different hash …
A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson
A Survey Of Archival Replay Banners, Sawood Alam, Mat Kelly, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
We surveyed various archival systems to compare and contrast different techniques used to implement an archival replay banner. We found that inline plain HTML injection is the most common approach, but prone to style conflicts. Iframe-based banners are also very common and while they do not have style conflicts, they suffer from screen real estate wastage and limited design choices. Custom Elements-based banners are promising, but due to being a new web standard, these are not yet widely deployed.
205.3 The Many Shapes Of Archive-It, Shawn Jones, Michael L. Nelson, Alexander Nwala, Michele C. Weigle
205.3 The Many Shapes Of Archive-It, Shawn Jones, Michael L. Nelson, Alexander Nwala, Michele C. Weigle
Computer Science Faculty Publications
Web archives, a key area of digital preservation, meet the needs of journalists, social scientists, historians, and government organizations. The use cases for these groups often require that they guide the archiving process themselves, selecting their own original resources, or seeds, and creating their own web archive collections. We focus on the collections within Archive-It, a subscription service started by the Internet Archive in 2005 for the purpose of allowing organizations to create their own collections of archived web pages, or mementos. Understanding these collections could be done via their user-supplied metadata or via text analysis, but the metadata is …
Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen
Anatomy Of Online Hate: Developing A Taxonomy And Machine Learning Models For Identifying And Classifying Hate In Online News Media, Joni Salminen, Hind Almerekhi, Milica Milenkovic, Soon-Gyu Jung, Haewoon Kwak, Haewoon Kwak, Bernard J. Jansen
Research Collection School Of Computing and Information Systems
Online social media platforms generally attempt to mitigate hateful expressions, as these comments can be detrimental to the health of the community. However, automatically identifying hateful comments can be challenging. We manually label 5,143 hateful expressions posted to YouTube and Facebook videos among a dataset of 137,098 comments from an online news media. We then create a granular taxonomy of different types and targets of online hate and train machine learning models to automatically detect and classify the hateful comments in the full dataset. Our contribution is twofold: 1) creating a granular taxonomy for hateful online comments that includes both …
Determining Vulnerability Using Attack Graphs: An Expansion Of The Current Fair Model, Beth M. Anderson
Determining Vulnerability Using Attack Graphs: An Expansion Of The Current Fair Model, Beth M. Anderson
EWU Masters Thesis Collection
Factor Analysis of Information Risk (FAIR) provides a framework for measuring and understanding factors that contribute to information risk. One such factor is FAIR Vulnerability; the probability that an event involving a threat will result in a loss. An asset is vulnerable if a threat actor’s Threat Capability is higher than the Resistance Strength of the asset. In FAIR scenarios, Resistance Strength is currently estimated for entire assets, oversimplifying assets containing individual systems and the surrounding environment. This research explores enhancing estimations of FAIR Vulnerability by modeling interactions between threat actors and assets through attack graphs. By breaking down the …
Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada
Classification Of Eeg Signals Of User States In Gaming Using Machine Learning, Chandana Mallapragada
Masters Theses
"In this research, brain activity of user states was analyzed using machine learning algorithms. When a user interacts with a computer-based system including playing computer games like Tetris, he or she may experience user states such as boredom, flow, and anxiety. The purpose of this research is to apply machine learning models to Electroencephalogram (EEG) signals of three user states -- boredom, flow and anxiety -- to identify and classify the EEG correlates for these user states. We focus on three research questions: (i) How well do machine learning models like support vector machine, random forests, multinomial logistic regression, and …
Smart Monitoring Via Participatory Ble Relaying, Meeralakshmi Radhakrishnan, Sougata Sen, Archan Misra, Youngki Lee, Rajesh Krishna Balan
Smart Monitoring Via Participatory Ble Relaying, Meeralakshmi Radhakrishnan, Sougata Sen, Archan Misra, Youngki Lee, Rajesh Krishna Balan
Research Collection School Of Computing and Information Systems
We espouse the vision of a smart object/campus architecture where sensors attached to smart objects use BLE as communication interface, and where smartphones act as opportunistic relays to transfer the data. We explore the feasibility of the vision with real-world Wi-Fi based location traces from our university campus. Our feasibility studies establish that redundancy exists in user movement within the indoor spaces, and that this redundancy can be exploited for collecting sensor data in an opportunistic, yet fair manner. We develop a couple of alternative heuristics that address the BLE energy asymmetry challenge by intelligently duty-cycling the scanning actions of …
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Introduction To The Usu Library Of Solutions To The Einstein Field Equations, Ian M. Anderson, Charles G. Torre
Introduction To The Usu Library Of Solutions To The Einstein Field Equations, Ian M. Anderson, Charles G. Torre
Tutorials on... in 1 hour or less
This is a Maple worksheet providing an introduction to the USU Library of Solutions to the Einstein Field Equations. The library is part of the DifferentialGeometry software project and is a collection of symbolic data and metadata describing solutions to the Einstein equations.
Altering The Expression Of Artemisinin Through Osmotic Manipulation, Tyler Friesen
Altering The Expression Of Artemisinin Through Osmotic Manipulation, Tyler Friesen
Theses/Capstones/Creative Projects
Artemisinin is an anti-malarial drug used in combination therapy to treat all malarial parasites in the blood stage. The expression of artemisinin within the plant Artemisia annua is only 1% of the dry weight. Methods for increasing the level of artemisinin within the plant were proposed. This paper looks into finding homologous enzymes across multiple species in order to find species where genetic manipulations will be useful. The second part of this paper looks at the use of osmotic stress to increase the reactive oxygen species in order to increase the amount of artemisinin within the plant. The database portion …
Robust Human Activity Recognition Using Lesser Number Of Wearable Sensors, Di Wang, Edwin Candinegara, Junhui Hou, Ah-Hwee Tan, Chunyan Miao
Robust Human Activity Recognition Using Lesser Number Of Wearable Sensors, Di Wang, Edwin Candinegara, Junhui Hou, Ah-Hwee Tan, Chunyan Miao
Research Collection School Of Computing and Information Systems
In recent years, research on the recognition of human physical activities solely using wearable sensors has received more and more attention. Compared to other types of sensory devices such as surveillance cameras, wearable sensors are preferred in most activity recognition applications mainly due to their non-intrusiveness and pervasiveness. However, many existing activity recognition applications or experiments using wearable sensors were conducted in the confined laboratory settings using specifically developed gadgets. These gadgets may be useful for a small group of people in certain specific scenarios, but probably will not gain their popularity because they introduce additional costs and they are …
Proactive Sequential Resource (Re)Distribution For Improving Efficiency In Urban Environments, Supriyo Ghosh
Proactive Sequential Resource (Re)Distribution For Improving Efficiency In Urban Environments, Supriyo Ghosh
Dissertations and Theses Collection (Open Access)
Due to the increasing population and lack of coordination, there is a mismatch in supply and demand of common resources (e.g., shared bikes, ambulances, taxis) in urban environments, which has deteriorated a wide variety of quality of life metrics such as success rate in issuing shared bikes, response times for emergency needs, waiting times in queues etc. Thus, in my thesis, I propose efficient algorithms that optimise the quality of life metrics by proactively redistributing the resources using intelligent operational (day-to-day) and strategic (long-term) decisions in the context of urban transportation and health & safety. For urban transportation, Bike Sharing …
Online Learning With Nonlinear Models, Doyen Sahoo
Online Learning With Nonlinear Models, Doyen Sahoo
Dissertations and Theses Collection (Open Access)
Recent years have witnessed the success of two broad categories of machine learning algorithms: (i) Online Learning; and (ii) Learning with nonlinear models. Typical machine learning algorithms assume that the entire data is available prior to the training task. This is often not the case in the real world, where data often arrives sequentially in a stream, or is too large to be stored in memory. To address these challenges, Online Learning techniques evolved as a promising solution to having highly scalable and efficient learning methodologies which could learn from data arriving sequentially. Next, as the real world data exhibited …
Policy Analytics For Environmental Sustainability: Household Hazardous Waste And Water Impacts Of Carbon Pollution Standards, Kustini
Dissertations and Theses Collection (Open Access)
Policy analytics are essential in supporting more informed policy-making in environmental management. This dissertation employs a fusion of machine methods and explanatory empiricism that involves data analytics, math programming, optimization, econometrics, geospatial and spatiotemporal analysis, and other approaches for assessing and evaluating current and future environmental policies.
Essay 1 discusses household informedness and its impact on the collection and recycling of household hazardous waste (HHW). Household informedness is the degree to which households have the necessary information to make utility-maximizing decisions about the handling of their waste. Such informedness seems to be influenced by HHW public education and environmental quality …
Enhanced Version Control For Unconventional Applications, Ahmed Saleh Shatnawi
Enhanced Version Control For Unconventional Applications, Ahmed Saleh Shatnawi
Theses and Dissertations
The Extensible Markup Language (XML) is widely used to store, retrieve, and share digital documents. Recently, a form of Version Control System has been applied to the language, resulting in Version-Aware XML allowing for enhanced portability and scalability. While Version Control Systems are able to keep track of changes made to documents, we think that there is untapped potential in the technology. In this dissertation, we present novel ways of using Version Control System to enhance the security and performance of existing applications. We present a framework to maintain integrity in offline XML documents and provide non-repudiation security features that …