Dissertations / Theses on the topic 'Support secure data processing'

To see the other types of publications on this topic, follow the link: Support secure data processing.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Support secure data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Найда, Андрій Олегович. "Адаптивний механізм управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/35934.

Full text
Abstract:
Дипломна робота: 66 с., 8 рис.,12 табл., 2 дод., 7 дж. Об’єкт дослідження – Адаптивні механізми управління захищеністю для підтримки безпечної обробки даних у розподілених комп'ютерних системах Програмний продукт – симуляційна програма для визначення шифрування та обробки повідомлень, мова програмування – C++. Мета роботи – дослідити методи реалізації адаптивних систем управління. Метод дослідження – опрацювання літератури та інших інформаційних джерел за даною темою, аналіз існуючих методів адаптивних механізмів управління.
Thesis: 66 p.,8 fig., 12 Table., 2 Appendix, 7 j. Object of study - Adaptive security management mechanisms to support secure data processing in distributed computer systems Software product - a simulation program for determining encryption and message processing, programming language - C ++. The purpose of the work is to investigate the methods of implementation of adaptive control systems. Research method - study of literature and other information sources on this topic, analysis of existing methods of adaptive management mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
2

Fan, Zhe. "Secure subgraph query services." HKBU Institutional Repository, 2015. https://repository.hkbu.edu.hk/etd_oa/229.

Full text
Abstract:
Graphs are powerful tools for a wide range of real applications, from Biological and Chemical Databases, Social Networks, Citation Networks to Knowledge Bases. Large graph data repositories have been consistently found in recent applications. Due to the high complexity of graph queries, e.g., NP-Completeness of subgraph query, and the lack of IT expertise, hosting efficient graph query services for the owners of graph data has been a technically challenging task. And hence, they may prefer to outsource their services to third-party service providers (SPs) for scalability, elasticity and efficiency. Unfortunately, SPs may not always be trusted. Security, typically the integrity and confidentiality, of the data, has been recognized as one of the critical attributes of Quality of Services (QoS). This directly influences the willingness of both data owners and query clients to use SP’s services. To address these concerns, this thesis proposes novel techniques to solve both authentication-aware and privacy-aware subgraph query. Firstly, we study authenticated subgraph query services (Chapter 3). To support the service, we propose Merkle IFTree (MIFTree) where Merkle hash trees are applied into our Intersection-aware Feature-subgraph Tree (IFTree). IFTree aims to minimize I/O in a well-received subgraph query paradigm namely the filtering-and-verification framework. The structures required to be introduced to verification objects (VOs) and the authentication time are minimized. Subsequently, the overall response time is minimized. For optimizations, we propose an enhanced authentication method on MIFTree. Secondly, we propose structure-preserving subgraph query services (Chapter 4). A crucial step of this part is to transform the seminal subgraph isomorphism algorithm (the Ullmann’s algorithm) into a series of matrix operations. We propose a novel cyclic group based encryption (CGBE) method for private matrix operations. We propose a protocol that involves the query client and static indexes for optimizations. We prove that the structural information of both query graph and data graph are preserved under CGBE and analyze the privacy preservation in the presence of the optimizations. Thirdly, we propose asymmetric structure-preserving subgraph query processing (Chapter 5), where the data graph is publicly known and the query structure/topology is kept secret. Unlike other previous methods for subgraph queries, this part proposes a series of novel optimizations that only exploit graph structures, not the queries. Further, we propose a robust query encoding and adopt our proposed cyclic group based encryption method, so that the query processing can be transformed into a series of private matrix operations and performed securely. The effectiveness and efficiency of all the techniques presented in this thesis are experimentally evaluated with both real-world and synthetic dataset
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beckman, Joseph M. "Legal requirements of secure systems." Thesis, Kansas State University, 1985. http://hdl.handle.net/2097/9822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mutsuddi, Monoreet. "Smart card enabled security services to support secure telemedicine applications." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1213.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2000.
Title from document title page. Document formatted into pages; contains vi, 70 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 70-71).
APA, Harvard, Vancouver, ISO, and other styles
6

Iwaya, Leonardo H. "Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-46982.

Full text
Abstract:
Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. Accidental or deliberate data breaches of health data may lead to societal pressures, embarrassment and discrimination. Information security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance. This thesis consists of publications contributing to mHealth security and privacy in various ways: with a comprehensive literature review about mHealth in Brazil; with the design of a security framework for MDCSs (SecourHealth); with the design of a MDCS (GeoHealth); with the design of Privacy Impact Assessment template for MDCSs; and with the study of ontology-based obfuscation and anonymisation functions for health data.
Information security and privacy are paramount to achieve high quality healthcare services, and further, to not harm individuals when providing care. With that in mind, we give special attention to the category of Mobile Health (mHealth) systems. That is, the use of mobile devices (e.g., mobile phones, sensors, PDAs) to support medical and public health. Such systems, have been particularly successful in developing countries, taking advantage of the flourishing mobile market and the need to expand the coverage of primary healthcare programs. Many mHealth initiatives, however, fail to address security and privacy issues. This, coupled with the lack of specific legislation for privacy and data protection in these countries, increases the risk of harm to individuals. The overall objective of this thesis is to enhance knowledge regarding the design of security and privacy technologies for mHealth systems. In particular, we deal with mHealth Data Collection Systems (MDCSs), which consists of mobile devices for collecting and reporting health-related data, replacing paper-based approaches for health surveys and surveillance.
APA, Harvard, Vancouver, ISO, and other styles
7

Lakshmanan, Subramanian. "Secure store a secure distributed storage service /." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-08052004-010409/unrestricted/lakshmanan%5Fsubramanian%5F200412%5Fphd.pdf.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2005.
Ramachandran, Umakishore, Committee Member ; Lee, Wenke, Committee Member ; Blough, Douglas M., Committee Member ; Venkateswaran, H., Committee Member ; Ahamad, Mustaque, Committee Member. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Xiao-Yu. "Evolving a secure grid-enabled, distributed data warehouse : a standards-based perspective." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/544.

Full text
Abstract:
As digital data-collection has increased in scale and number, it becomes an important type of resource serving a wide community of researchers. Cross-institutional data-sharing and collaboration introduce a suitable approach to facilitate those research institutions that are suffering the lack of data and related IT infrastructures. Grid computing has become a widely adopted approach to enable cross-institutional resource-sharing and collaboration. It integrates a distributed and heterogeneous collection of locally managed users and resources. This project proposes a distributed data warehouse system, which uses Grid technology to enable data-access and integration, and collaborative operations across multi-distributed institutions in the context of HV/AIDS research. This study is based on wider research into OGSA-based Grid services architecture, comprising a data-analysis system which utilizes a data warehouse, data marts, and near-line operational database that are hosted by distributed institutions. Within this framework, specific patterns for collaboration, interoperability, resource virtualization and security are included. The heterogeneous and dynamic nature of the Grid environment introduces a number of security challenges. This study also concerns a set of particular security aspects, including PKI-based authentication, single sign-on, dynamic delegation, and attribute-based authorization. These mechanisms, as supported by the Globus Toolkit’s Grid Security Infrastructure, are used to enable interoperability and establish trust relationship between various security mechanisms and policies within different institutions; manage credentials; and ensure secure interactions.
APA, Harvard, Vancouver, ISO, and other styles
9

Mxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.

Full text
Abstract:
Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
APA, Harvard, Vancouver, ISO, and other styles
10

Kordale, Rammohan. "System support for scalable services." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sedar, Roshan. "A Secure and Reliable Platform for Storing and Processing Genomic Data on Hadoop." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177202.

Full text
Abstract:
Since 2007, the cost of sequencing a whole human genome has decreased by roughly half every 4 months. As of 2014, whole genome sequencing would cost only 1,000 dollars, and, as such, Next-Generation sequencing (NGS) machines are now a source of Big Data - the Illumina HiSeq X Ten can produce up to 20 PB of data per year. The dominant open-source platform for storing and processing Big Data is Apache Hadoop. However, Hadoop does not support user identity natively, and, as genomic data is sensitive data, there are no existing solutions for multi-tenancy that meet the needs of organizations to securely store and process genomic data. In this thesis, we address the problem for how to enable Biobank users to securely store, access, and share genomic data in Hadoop. The proposed solution of the work is based on leveraging security support in the J2EE framework, and by constraining access to Hadoop through a web application built in this project. However, HTTP(S) limits the size of files that can be transferred into web applications, and we address the follow-on problem of how to enable users to efficiently, easily, and securely copy genomic data into Hadoop. Our prototype demonstrates how Hadoop can be secured to support sensitive data, and how Big Data can be securely transported over HTTP.
APA, Harvard, Vancouver, ISO, and other styles
12

Brasee, Kaleb. "Secure distributed single sign-on with two-factor authentication /." Connect to Online Resource-OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1195656733.

Full text
Abstract:
Thesis (M.S.)--University of Toledo, 2007.
Typescript. "Submitted as partial fulfillments of the requirements for the Master of Engineering with a concentration in Computer Science." "A thesis entitled"--at head of title. Bibliography: leaves 69-72.
APA, Harvard, Vancouver, ISO, and other styles
13

FISHER, GARY LEE. "A SOFTWARE ARCHITECTURE FOR STRATEGIC MANAGEMENT SUPPORT SYSTEMS UTILIZING INTERACTIVE GRAPHICS (STAKEHOLDER, REUSABLE CODE, GROUP DECISION SUPPORT)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183818.

Full text
Abstract:
A software architecture for strategic-management support-systems is developed, with an underlying principle that new additions to the library of planning tools in such support systems should not have to be new programming efforts. The current status of group decision support is surveyed and the lack of a software architecture for such systems is noted. The software architecture that has been developed is intended to guide the development of such support systems and is based on a library of procedural abstractions called elemental-engines. Selected sets of elemental-engines are assembled into synthesized support drivers which support an even higher level of abstraction, that of the generic logic supporting a family of planning tools. Thus, a family of planning tools may be expanded by the simple creation of text files, containing the dialog of the new tool. The work looks first at the nature of strategic management decision-making, then to work done in group decision support systems. A framework for software development, particularly in the area of list-processing is presented. A data structure to support such list processing is developed and discussed. An example of the software architecture is presented via the code for the initial planning-tool developed. This code was then generalized into the library of elemental-engines and a set of synthesized support drivers. This library of planning-tools, built around the architecture is described, and the use of the tools in a planning session is evaluated. Some possible extensions with respect to a decision laboratory are suggested. The laboratory incorporates features developed in the evolution of using computers to support human decision-making, with software written according to the architecture presented.
APA, Harvard, Vancouver, ISO, and other styles
14

Mantoro, Teddy. "Distributed support for intelligent environments /." View thesis entry in Australian Digital Theses Program, 2006. http://thesis.anu.edu.au/public/adt-ANU20070123.150814/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kalibjian, Jeff, and Steven Wierenga. "Assuring Post Processed Telemetry Data Integrity With a Secure Data Auditing Appliance." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604910.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada
Recent federal legislation (e.g. Sarbanes Oxley, Graham Leach Bliley) has introduced requirements for compliance including records retention and records integrity. Many industry sectors (e.g. Energy, under the North American Energy Reliability Council) are also introducing their own voluntary compliance mandates to avert possible additional federal regulation. A trusted computer appliance device dedicated to data auditing may soon be required in all corporate IT infrastructures to accommodate various compliance directives. Such an auditing device also may have application in telemetry post processing environments, as it maybe used to guarantee the integrity of post-processed telemetry data.
APA, Harvard, Vancouver, ISO, and other styles
16

Khalidi, M. Yousef Amin. "Hardware support for distributed object-based systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/8192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Caneill, Matthieu. "Contributions to large-scale data processing systems." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAM006/document.

Full text
Abstract:
Cette thèse couvre le sujet des systèmes de traitement de données àgrande échelle, et plus précisément trois approches complémentaires :la conception d'un système pour prédir des défaillances de serveursgrâce à l'analyse de leurs données de supervision; l'acheminement dedonnées dans un système à temps réel en étudiant les corrélationsentre les champs des messages pour favoriser la localité; etfinalement un environnement de développement innovateur pour concevoirdes transformations de donées en utilisant des graphes orientés deblocs.À travers le projet Smart Support Center, nous concevons unearchitecture qui passe à l'échelle, afin de stocker des sériestemporelles rapportées par des moteurs de supervision, qui vérifienten permanence la santé des systèmes informatiques. Nous utilisons cesdonnées pour effectuer des prédictions, et détecter de potentielsproblèmes avant qu'ils ne ne produisent.Nous nous plongeons ensuite dans les algorithmes d'acheminement pourles sytèmes de traitement de données en temps réel, et développons unecouche pour acheminer les messages plus efficacement, en évitant lesrebonds entre machines. Dans ce but, nous identifions en temps réelles corrélations qui apparaissent entre les champs de ces messages,tels les mots-clics et leur localisation géographique, par exempledans le cas de micromessages. Nous utilisons ces corrélations pourcréer des tables d'acheminement qui favorisent la colocation desacteurs traitant ces messages.Pour finir, nous présentons λ-blocks, un environnement dedéveloppement pour effectuer des tâches de transformations de donnéessans écrire de code source, mais en créant des graphes de blocs decode. L'environnement est rapide, et est distribué avec des pilesincluses: libraries de blocs, modules d'extension, et interfaces deprogrammation pour l'étendre. Il est également capable de manipulerdes graphes d'exécution, pour optimisation, analyse, vérification, outout autre but
This thesis covers the topic of large-scale data processing systems,and more precisely three complementary approaches: the design of asystem to perform prediction about computer failures through theanalysis of monitoring data; the routing of data in a real-time systemlooking at correlations between message fields to favor locality; andfinally a novel framework to design data transformations usingdirected graphs of blocks.Through the lenses of the Smart Support Center project, we design ascalable architecture, to store time series reported by monitoringengines, which constantly check the health of computer systems. We usethis data to perform predictions, and detect potential problems beforethey arise.We then dive in routing algorithms for stream processing systems, anddevelop a layer to route messages more efficiently, by avoiding hopsbetween machines. For that purpose, we identify in real-time thecorrelations which appear in the fields of these messages, such ashashtags and their geolocation, for example in the case of tweets. Weuse these correlations to create routing tables which favor theco-location of actors handling these messages.Finally, we present λ-blocks, a novel programming framework to computedata processing jobs without writing code, but rather by creatinggraphs of blocks of code. The framework is fast, and comes withbatteries included: block libraries, plugins, and APIs to extendit. It is also able to manipulate computation graphs, foroptimization, analyzis, verification, or any other purposes
APA, Harvard, Vancouver, ISO, and other styles
18

Krupczak, Bobby. "Protocol subsystem support for efficient and flexible communication services." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ceccucci, Wency A. "Decision support systems design: a nursing scheduling application." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/40303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chu, Shun-Kwong. "Scaling up support vector data description by using core-sets /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20CHU.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 60-64). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
21

Perry, Matthew Steven. "A Framework to Support Spatial, Temporal and Thematic Analytics over Semantic Web Data." Wright State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=wright1219267560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Gaudon, Melanie E. "Extensions to Aldat to support distributed database operations with no global scheme." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Miller, David B. "Decision support systems for land evaluation : theoretical and practical development." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24865.

Full text
Abstract:
The challenge of resolving land use allocation and policy questions depends to a large degree on the conversion of data into information, and the effective integration of information into the decision process. Land evaluation is one of the fundamental means of generating information for land planning. Information products have however, been inconsistently and ineffectively used in the decision process. This thesis develops a decision centered approach to land evaluation as a response to this concern. Included in this development is a description of important theoretical concepts, as well as a practical demonstration of the use of decision support systems as a design approach. Initially, a conceptual model is introduced illustrating the technical and use components of information generation, as well as the adaptive design cycle. Various terms and techniques involved in the technical aspects of land evaluation are reviewed. Decision making concepts including decision structure, environment, analysis, and criteria are outlined. Three existing methods of land evaluation are then compared from a use or decision making perspective. Having completed a review of current approaches, Decision Support Systems are introduced as a logical progression towards a decision centered approach. Decision Support System design is demonstrated using a portion of the Central Fraser Valley Regional District as a case study area combined with an interactive microcomputer land planning tool (LANDPLAN). The demonstration emphasizes the advantages of the flexible, interactive capabilities of Decision Support Systems in aiding the decision process. Iterative design is also promoted with several needs identified if a more complete system is to be developed. In particular, data on strategic long term supply and demand factors is required, as well as continuous rating functions for assessing land performance.
Science, Faculty of
Resources, Environment and Sustainability (IRES), Institute for
Graduate
APA, Harvard, Vancouver, ISO, and other styles
24

Nodine, Dewayne J. "Spatial decision support system for evaluation of land use plans based upon storm water runoff impacts : a theoretical framework." Virtual Press, 1996. http://liblink.bsu.edu/uhtbin/catkey/1020175.

Full text
Abstract:
All land uses affect storm water runoff However, different uses of the same site generate varying amounts of runoff Many communities have come to rely upon detention and/or retention basins for controlling the additional runoff resulting from land development. It is argued that this incremental approach to storm water management must be replaced with a more proactive long-term view.To achieve this, more user-friendly software capable of modeling the effect long-range land use plans have on the volume and behavior of storm water runoff is needed. This software, called a Spatial Decision Support System (SDSS), must be capable of guiding the user, who may not be an expert at runoff analysis, through the process and also capable of generating output in various formats understandable by lay persons. This study utilizes a systems analysis technique to develop a theoretical framework for the Storm Water SDSS.
Department of Urban Planning
APA, Harvard, Vancouver, ISO, and other styles
25

Pang, Bo. "Handwriting Chinese character recognition based on quantum particle swarm optimization support vector machine." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Rahman, M. Mostafizur. "Machine learning based data pre-processing for the purpose of medical data mining and decision support." Thesis, University of Hull, 2014. http://hydra.hull.ac.uk/resources/hull:10103.

Full text
Abstract:
Building an accurate and reliable model for prediction for different application domains, is one of the most significant challenges in knowledge discovery and data mining. Sometimes, improved data quality is itself the goal of the analysis, usually to improve processes in a production database and the designing of decision support. As medicine moves forward there is a need for sophisticated decision support systems that make use of data mining to support more orthodox knowledge engineering and Health Informatics practice. However, the real-life medical data rarely complies with the requirements of various data mining tools. It is often inconsistent, noisy, containing redundant attributes, in an unsuitable format, containing missing values and imbalanced with regards to the outcome class label. Many real-life data sets are incomplete, with missing values. In medical data mining the problem with missing values has become a challenging issue. In many clinical trials, the medical report pro-forma allow some attributes to be left blank, because they are inappropriate for some class of illness or the person providing the information feels that it is not appropriate to record the values for some attributes. The research reported in this thesis has explored the use of machine learning techniques as missing value imputation methods. The thesis also proposed a new way of imputing missing value by supervised learning. A classifier was used to learn the data patterns from a complete data sub-set and the model was later used to predict the missing values for the full dataset. The proposed machine learning based missing value imputation was applied on the thesis data and the results are compared with traditional Mean/Mode imputation. Experimental results show that all the machine learning methods which we explored outperformed the statistical method (Mean/Mode). The class imbalance problem has been found to hinder the performance of learning systems. In fact, most of the medical datasets are found to be highly imbalance in their class label. The solution to this problem is to reduce the gap between the minority class samples and the majority class samples. Over-sampling can be applied to increase the number of minority class sample to balance the data. The alternative to over-sampling is under-sampling where the size of majority class sample is reduced. The thesis proposed one cluster based under-sampling technique to reduce the gap between the majority and minority samples. Different under-sampling and over-sampling techniques were explored as ways to balance the data. The experimental results show that for the thesis data the new proposed modified cluster based under-sampling technique performed better than other class balancing techniques. In further research it is found that the class imbalance problem not only affects the classification performance but also has an adverse effect on feature selection. The thesis proposed a new framework for feature selection for class imbalanced datasets. The research found that, using the proposed framework the classifier needs less attributes to show high accuracy, and more attributes are needed if the data is highly imbalanced. The research described in the thesis contains the flowing four novel main contributions. a) Improved data mining methodology for mining medical data b) Machine learning based missing value imputation method c) Cluster Based semi-supervised class balancing method d) Feature selection framework for class imbalance datasets The performance analysis and comparative study show that the use of proposed method of missing value imputation, class balancing and feature selection framework can provide an effective approach to data preparation for building medical decision support.
APA, Harvard, Vancouver, ISO, and other styles
27

Fuhry, Benny [Verfasser], and Frederik [Akademischer Betreuer] Armknecht. "Secure and efficient processing of outsourced data structures using trusted execution environments / Benny Fuhry ; Betreuer: Frederik Armknecht." Mannheim : Universitätsbibliothek Mannheim, 2021. http://d-nb.info/1229835911/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Muchemwa, Regis Fadzi. "Real-time decision support systems in a selected big data environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2350.

Full text
Abstract:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2016.
The emergence of big data (BD) has rendered existing conventional business intelligence (BI) tools inefficient and ineffective for real-time decision support systems (DSS). The inefficiency and ineffectiveness is perceived when business users need to make decisions based on stale and sometimes, incomplete data sets, which potentially leads to slow and poor decision making. In recent years, industry and academia have invented new technologies to process BD such as Hadoop, Spark, in-memory databases and NOSQL databases. The appearance of these new technologies have escalated to an extent, that organisations are faced with the challenge of determining most suitable technologies that are appropriate for real-time DSS requirements. Due to BD still being a new concept, there are no standard guidelines or frameworks available to assist in the evaluation and comparing of BD technologies. This research aims to explore factors that influence the selection of technologies appropriate for real-time DSSs in a BD environment. In addition, it further proposes evaluation criteria that can be used to compare and select these technologies. To achieve this aim, a literature analysis to understand the concept of BD, real-time DSSs and related technologies is conducted. Qualitative as well as quantitative research techniques are used after interviews are conducted with BI experts who have BD knowledge and experience. Experimental research in a computer laboratory is also conducted. The purpose of the interviews is to ascertain which technologies are being used for BD analytics and in addition, which evaluation criteria organisations use when choosing such a technology. Furthermore, a comparative computer laboratory experiment is conducted to compare three tools which run on Hadoop namely; Hive, Impala and Spark. The purpose of the experiment is to test if system performance is different for the three tools when analysing the same data set and the same computer resources. The impirical results reveals nine main factors which impact the selection of technologies appropriate for real-time DSS in a BD environment, and ten application independent evaluation criteria. Furthermore, the experiment results indicate that system performance in terms of latency, is significantly different among the three tools compared.
APA, Harvard, Vancouver, ISO, and other styles
29

Allison, Colin. "Systems support for distributed learning environments." Thesis, University of St Andrews, 2003. http://hdl.handle.net/10023/14519.

Full text
Abstract:
This thesis contends that the growing phenomena of multi-user networked "learning environments" should be treated as distributed interactive systems and that their developers should be aware of the systems and networks issues involved in their construction and maintenance. Such environments are henceforth referred to as distributed learning environments, or DLEs. Three major themes are identified as part of systems support: i) shared resource coherence in DLEs; ii) Quality of Service for the end- users of DLEs; and iii) the need for an integrating framework to develop, deploy and manage DLEs. The thesis reports on several distinct implementations and investigations that are each linked by one or more of those themes. Initially, responsiveness and coherence emerged as potentially conflicting requirements, and although a system was built that successfully resolved this conflict it proved difficult to move from the "clean room" conditions of a research project into a real world learning context. Accordingly, subsequent systems adopted a web-based approach to aid deployment in realistic settings. Indeed, production versions of these systems have been used extensively in credit-bearing modules in several Scottish Universities. Interactive responsiveness then emerged as a major Quality of Service issue in its own right, and motivated a series of investigations into the sources of delay, as experienced by end users of web-oriented distributed learning environments. Investigations into this issue provided insight into the nature of web-oriented interactive distributed learning and highlighted the need to be QoS-aware. As the volume and the range of usage of distributed learning applications increased the need for an integrating framework emerged. This required identifying and supporting a wide variety of educational resource types and also the key roles occupied by users of the system, such as tutors, students, supervisors, service providers, administrators, examiners. The thesis reports on the approaches taken and lessons learned from researching, designing and implementing systems which support distributed learning. As such, it constitutes a documented body of work that can inform the future design and deployment of distributed learning environments.
APA, Harvard, Vancouver, ISO, and other styles
30

Devine, Jon. "Support Vector Methods for Higher-Level Event Extraction in Point Data." Fogler Library, University of Maine, 2009. http://www.library.umaine.edu/theses/pdf/DevineJ2009.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ho, Chi-fai Thomas, and 何志輝. "Developing planning support system for heritage conservation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31261267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hwang, Kuo-Ping. "Applying heuristic traffic assignment in natural disaster evacuation: a decision support system." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/54455.

Full text
Abstract:
The goal of this research is to develop a heuristic traffic assignment method to simulate the traffic flow of a transportation network at a real-time speed. The existing assignment methods are reviewed and a heuristic path-recording assignment method is proposed. Using the new heuristic assignment method, trips are loaded onto the network in a probabilistic approach for the first iteration; paths are recorded, and path impedance is computed as the basis for further assignment iteration. The real-time traffic assignment model developed with the new assignment method is called HEUPRAE. The difference in link traffic between this new assignment and Dial's multipath assignment ranges from 10 to 25 percent. Saving in computer time is about 55 percent. The proposed heuristic path-recording assignment is believed to be an efficient and reliable method. Successful development of this heuristic assignment method helps solve those transportation problems which need assignment results at a real-time speed, and for which the assignment process lasts a couple of hours. Evacuation planning and operation are well suited to the application of this real-time heuristic assignment method. Evacuation planning and operations are major activities in emergency management. Evacuation planning instructs people where to go, which route to take, and the time needed to accomplish an evacuation. Evacuation operations help the execution of an evacuation plan in response to the changing nature of a disaster. The Integrated Evacuation Decision Support System (IEDSS) is a computer system which employs the evacuation planning model, MASSVAC2, and the evacuation operation model, HEUPRAE, to deal with evacuations. The IEDSS uses computer graphics to prepare input and interpret output. It helps a decision maker analyze the evacuation system, review evacuation plans, and issue an evacuation order at a proper time. Users of the IEDSS can work on evacuation problems in a friendly interactive visual environment. The application of the IEDSS to the hurricane and flood problems for the city of Virginia Beach shows how IEDSS is practically implemented. It proves the usefulness of the IEDSS in coping with disasters.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
33

蘇植良 and Chek-leung Bassanio So. "A study of decision support system application in productivity measurement by micro-computer." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1985. http://hub.hku.hk/bib/B31263392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Frankel, Seth Elijah. "OBSERVATIONS ON THE THEORY AND REALITY OF MANAGERIAL USE OF COMPUTER-BASED DECISION SUPPORT (MIS, DSS)." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yan, Chenyu. "Architectural support for improving security and performance of memory sub-systems." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26663.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Milos Prvulovic; Committee Member: Gabriel Loh; Committee Member: Hyesoon Kim; Committee Member: Umakishore Ramachandran; Committee Member: Yan Solihin. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
36

Gheith, Ahmed M. "Support for multi-weight object, invocations and atomicity in real-time systems." Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/8173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Shi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.

Full text
Abstract:
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes certain cryptographic and security features integrated into the general purpose processor and computing platform to protect confidentiality and integrity of digital content stored in a computing system's memory. System designers can take advantages of the availability of the proposed security model to build future security systems such as systems with strong anti-reverse engineering capability, digital content protection system, or trusted computing system with strong tamper-proof protection. The thesis explores architecture level optimizations and design trade-offs for supporting high performance tamper-resistant memory model and micro-processor architecture. It expands the research of the previous studies on tamper-resistant processor design on several fronts. It offers some new architecture and design optimization techniques to further reduce the overhead of memory protection over the previous approaches documented in the literature. Those techniques include prediction based memory decryption and efficient memory integrity verification approaches. It compares different encryption modes applicable to memory protection and evaluates their pros and cons. In addition, the thesis tries to solve some of the security issues that have been largely ignored in the prior art. It presents a detailed investigation of how to integrate confidentiality protection and integrity protection into the out-of-order processor architecture both efficiently and securely. Furthermore, the thesis also expands the coverage of protection from single processor to multi-processor.
APA, Harvard, Vancouver, ISO, and other styles
38

Wang, Kaibo. "Algorithmic and Software System Support to Accelerate Data Processing in CPU-GPU Hybrid Computing Environments." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1447685368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Zeynali, Reyhaneh. "Geomatics data acquisition and processing in support of Urban Heat Island studies, case study Bologna." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2022.

Find full text
Abstract:
Global warming and changes in Earth’s weather patterns are the main consequences of climate change, and bioclimate discomfort has significant public health problems, especially for the elderly. Normally, the thermal characteristics of urban areas are poor due to a phenomenon known as urban heat island (UHI). To study the thermal characteristics of the city of Bologna, mobile temperature measurements took place with a car, along a 75-km transect, while fixed measurements of temperature have done using 15 present weather stations and also placing five thermometers in the city center. Some interpolation models (i.e., global, and local interpolators) are applied to correct the mobile measurements using fixed data. Kriging fulfilled the best result with a correlation coefficient of 0.99. However, there was no meaningful correlation between the corrected temperatures and remote sensing land surface temperature (LST) data (due to lack of nocturnal remote sensing imagery), its correlation with remote sensing normalized difference vegetation index data (NDVI) was 0.69.
APA, Harvard, Vancouver, ISO, and other styles
40

Nakamura, Carlos. "The effects of specific support to hypothesis generation on the diagnostic performance of medical students /." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102817.

Full text
Abstract:
The hypothetico-deductive method, which involves an iterative process of hypothesis generation and evaluation, has been used for decades by physicians to diagnose patients. This study focuses on the levels of support that medical information systems can provide during these stages of the diagnostic reasoning process. The physician initially generates a list of possible diagnoses (hypotheses) based on the patients' symptoms. Later, those hypotheses are examined to determine which ones best account for the signs, symptoms, physical examination findings, and laboratory test results. Hypothesis generation is especially challenging for medical students because the organization of knowledge in medical school curricula is disease-centered. Furthermore, the clinical reference tools that are regularly used by medical students (such as Harrison's Online, UpToDate, and eMedicine) are mostly organized by disease. To address this issue, Abduction, a hypothesis generation tool; was developed for this study. Sixteen medical students were asked to solve two patient cases in two different conditions: A (support of clinical reference tools chosen by the participant and Abduction ) and B (support of clinical reference tools chosen by the participant). In Condition A, participants were able to generate the correct diagnosis in all 16 occasions (100%) and were able to confirm it in 13 occasions (81.25%). In Condition B, participants were able to generate the correct diagnosis in three out of 16 occasions (18.75%) and were able to confirm it once (6.25%). The implications of this study are discussed with respect to the cognitive support that Abduction can provide to medical students for clinical diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
41

Raghavan, Venkatesh. "Supporting Multi-Criteria Decision Support Queries over Disparate Data Sources." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/120.

Full text
Abstract:
In the era of "big data revolution," marked by an exponential growth of information, extracting value from data enables analysts and businesses to address challenging problems such as drug discovery, fraud detection, and earthquake predictions. Multi-Criteria Decision Support (MCDS) queries are at the core of big-data analytics resulting in several classes of MCDS queries such as OLAP, Top-K, Pareto-optimal, and nearest neighbor queries. The intuitive nature of specifying multi-dimensional preferences has made Pareto-optimal queries, also known as skyline queries, popular. Existing skyline algorithms however do not address several crucial issues such as performing skyline evaluation over disparate sources, progressively generating skyline results, or robustly handling workload with multiple skyline over join queries. In this dissertation we thoroughly investigate topics in the area of skyline-aware query evaluation. In this dissertation, we first propose a novel execution framework called SKIN that treats skyline over joins as first class citizens during query processing. This is in contrast to existing techniques that treat skylines as an "add-on," loosely integrated with query processing by being placed on top of the query plan. SKIN is effective in exploiting the skyline characteristics of the tuples within individual data sources as well as across disparate sources. This enables SKIN to significantly reduce two primary costs, namely the cost of generating the join results and the cost of skyline comparisons to compute the final results. Second, we address the crucial business need to report results early; as soon as they are being generated so that users can formulate competitive decisions in near real-time. On top of SKIN, we built a progressive query evaluation framework ProgXe to transform the execution of queries involving skyline over joins to become non-blocking, i.e., to be progressively generating results early and often. By exploiting SKIN's principle of processing query at multiple levels of abstraction, ProgXe is able to: (1) extract the output dependencies in the output spaces by analyzing both the input and output space, and (2) exploit this knowledge of abstract-level relationships to guarantee correctness of early output. Third, real-world applications handle query workloads with diverse Quality of Service (QoS) requirements also referred to as contracts. Time sensitive queries, such as fraud detection, require results to progressively output with minimal delay, while ad-hoc and reporting queries can tolerate delay. In this dissertation, by building on the principles of ProgXe we propose the Contract-Aware Query Execution (CAQE) framework to support the open problem of contract driven multi-query processing. CAQE employs an adaptive execution strategy to continuously monitor the run-time satisfaction of queries and aggressively take corrective steps whenever the contracts are not being met. Lastly, to elucidate the portability of the core principle of this dissertation, the reasoning and query processing at different levels of data abstraction, we apply them to solve an orthogonal research question to auto-generate recommendation queries that facilitate users in exploring a complex database system. User queries are often too strict or too broad requiring a frustrating trial-and-error refinement process to meet the desired result cardinality while preserving original query semantics. Based on the principles of SKIN, we propose CAPRI to automatically generate refined queries that: (1) attain the desired cardinality and (2) minimize changes to the original query intentions. In our comprehensive experimental study of each part of this dissertation, we demonstrate the superiority of the proposed strategies over state-of-the-art techniques in both efficiency, as well as resource consumption.
APA, Harvard, Vancouver, ISO, and other styles
42

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Tianqi, and 王天琦. "An architecture to support scalable distributed virtual environment systems on grid." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31473374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Paul, Arnab. "Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6848.

Full text
Abstract:
This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing. The main results are at the intersection of Security and Fault Tolerance for these environments. There are two primary areas that are explored in this thesis. 1. We have investigated protocols for large scale fault tolerant secure distributed storage. The two main concerns here are security and redundancy. In one arm of this research we developed SAFE, a distributed storage system based on a new protocol that offers a two-in-one solution to fault-tolerance and confidentiality. This protocol is based on cryptographic properties of error correction codes. In another arm, we developed esf, another prototype distributed persistent storage; esf facilitates seamless hardware extension of storage units, high resilience to loads and provides high availability. The main ingredient in its design is a modern class of erasure codes known as the {em Fountain Codes}. One problem in such large storage is the heavy overhead of the associated fingerprints needed for checking data integrity. esf deploys a clever integrity check mechanism by use of a data structure known as the {em Merkle Tree} to address this issue. 2. We also investigated the design of a new remote authentication protocol. Applications over long range wireless would benefit quite a bit from this design. We designed and implemented LAWN, a lightweight remote authentication protocol for wireless networks that deploys a randomized approximation scheme based on Error correcting codes. We have evaluated in detail the performance of LAWN; while it adds very low overhead of computation, the savings in bandwidth and power are quite dramatic.
APA, Harvard, Vancouver, ISO, and other styles
45

Pedroza, Moises, and Filiberto Macias. "OFF-RANGE CORRIDOR SUPPORT." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/606814.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
White Sands Missile Range is supporting Ballistic Missile Defense Organization (BMDO) target firings from Ft. Wingate, NM. This two Off-Range Corridor allows BMDO to conduct long range testing within the continental U.S. The Transportable Range Augmentation and Control System (TRACS), consisting of a control van and one of two Mobile Telemetry Systems (MTS), provide the necessary on-site telemetry support. The Dual Remote Interferometer System (DRDAS) that tracks the telemetry RF carrier in support of Missile Flight Safety (MFS) is also included in this paper. This paper describes the telemetry support scenario in terms of preliminary simulations followed by real-time support. Real-time support consists of data distribution from the MTS to the Telemetry Distribution Center, TRACS Control van, Missile Flight Safety display van, Project Support vans, on-site data processing, as well as relaying raw data to the main WSMR Telemetry Data Center (TDC) for real-time analysis. As soon as telemetry data arrives at the TDC, it is converted into information. This information is used by MFS during real-time monitoring of vehicle performance. This paper includes the methods used for the conversion of data into information on-site and at TDC. Real-time data processing involves multiple independent systems performing their respective tasks on a particular segment of data.
APA, Harvard, Vancouver, ISO, and other styles
46

Tsoi, Yiu-lun Kelvin, and 蔡耀倫. "Real-time scheduling techniques with QoS support and their applications in packet video transmission." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B31221786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Norman, Ronald Jules. "Integrated development environments in support of information systems design methodologies and systems analysts' productivity." Diss., The University of Arizona, 1987. http://hdl.handle.net/10150/184275.

Full text
Abstract:
Integrated development environment products, called CASE technology by practitioners, are being purchased by enterprises to assist systems analysts with the analysis and design of information systems. This work surveys users of a commercially available CASE product. Ninty-one users from 47 enterprises in the U.S. and Canada responded to the personal computer based survey. This work analyses the perceptions of the respondents in an attempt to determine productivity improvement over manual methods. Using the perceptions of the respondents, the component parts of the CASE product were rank ordered in terms of improved productivity. In addition to this, a psychometric preference scaling method was used to interpret the relatedness of the component parts to each other, again based on the perceptions of the respondents.
APA, Harvard, Vancouver, ISO, and other styles
48

Ndwe, Tembalethu Jama. "An investigation into the viability of deploying thin client technology to support effective learning in a disadvantaged, rural high school setting." Thesis, Rhodes University, 2002. http://hdl.handle.net/10962/d1006500.

Full text
Abstract:
Computer Based Training offers many attractive learning opportunities for high school pupils. Its deployment in economically depressed and educationally marginalized rural schools is extremely uncommon due to the high technology skills and costs involved in its deployment and ongoing maintenance. This thesis puts forward thin client technology as a potential solution to the needs of education environments of this kind. A functional business case is developed and evaluated in this thesis, based upon a requirements analysis of media delivery in learning, and upon formal cost/performance models and a deployment field trial. Because of the economic constraints of the envisaged deployment area in rural education, an industrial field trial is used, and the aspects of this trial that can be carried over to the rural school situation have been used to assess performance and cost indicators. Our study finds that thin client technology could be deployed and maintained more cost effectively than conventional fat client solutions in rural schools, that it is capable of supporting the learning elements needed in this deployment area, and that it is able to deliver the predominantly text based applications currently being used in schools. However, we find that technological improvements are needed before future multimediaintensive applications can be adequately supported.
APA, Harvard, Vancouver, ISO, and other styles
49

Briggs, Robert Owen. "The focus theory of group productivity and its application to development and testing of electronic group support systems." Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186938.

Full text
Abstract:
This dissertation develops the Focus Theory of Group Productivity, describes the use of the theory to guide development of several electronic group support tools, and reports the results of experiments testing whether the tools yield the predicted productivity gains. Focus theory posits that to be productive group members must divide their attention between three cognitive processes: communication, Deliberation, and information access. Communication, Deliberation, and information access are, in turn, constrained by limited attention and fading memory. Finally group members are only willing to engage their attention resources to the extent that the group goal is congruent with their individual goals. Electronic tools can reduce the attention demand of each of the three cognitive processes, and focus participant attention on appropriate problem-solving behaviors. Electronic tools can foster goal congruence under some circumstances. This dissertation describes how Focus Theory guided the development of the several electronic tools to support the needs of real groups experiencing real productivity problems. It reports the results of several laboratory experiments to test the goal-congruence hypothesis of Focus Theory. The first experiment frames social loafing and social comparison as goal congruence issues, showing that subjects using a real-time graph to compare their own performance to that of an average group generated more unique ideas than a group with no basis for comparison. Facilitation techniques boosted the salience of the comparison, further increasing performance. The second study frames affective reward as a goal congruence issue and develops and validates a measure for the construct. The third study frames user interface design in terms of goal congruence and demonstrates the strengths (pointing, selecting, moving, fine motor control) and weaknesses (handwriting recognition) of pen-based interfaces in those terms. The fourth study frames the classroom as a group-productivity setting and demonstrates that group support systems can be used to improve classroom interactions.
APA, Harvard, Vancouver, ISO, and other styles
50

Kar, Shruti. "Multi-Scale and Multi-Modal Streaming Data Aggregation and Processing for Decision Support during Natural Disasters." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1547811329783514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography