You searched for +publisher:"University of Alabama" +contributor:("Brown, Marcus")
.
Showing records 1 – 14 of
14 total matches.
No search limiters apply to these results.

University of Alabama
1.
Kassas, Nure Biane.
Real-time prosodic aspects of text generated speech.
Degree: 2014, University of Alabama
URL: http://purl.lib.ua.edu/120394
► The purpose of this study was to investigate the feasibility and effectiveness of a text to speech (TTS) device that allows the user to manipulate…
(more)
▼ The purpose of this study was to investigate the feasibility and effectiveness of a text to speech (TTS) device that allows the user to manipulate pitch and volume as speech is being generated. This device was intended to facilitate the communicative needs of individuals with complex communication needs (CCN) as a result of acquired neurological conditions such as dysarthria. An Android touchscreen tablet with a built-in speech engine was used as the hardware for the TTS device, and a post-audio signal processing approach was utilized to program the TTS device. Results were collected in two separate phases: auditory and use-based. During the auditory phase, participants listened to audio samples from the thesis TTS device, a typical TTS device, and human speech and then rated them based on perceived affect (positive vs. negative) or intent (question vs. statements) categories. During the use-based phase, participants provided feedback about the thesis TTS device after using it to communicate with the study investigator. Although auditory phase results indicated that the thesis device was currently not as effective as human speech when communicating emotion and intent, use-based findings were more promising. Use-based results revealed that the new features the thesis TTS provided (ability to manipulate pitch and volume) were considered beneficial. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Buhr, Anthony, Brown, Marcus, Davis, Priscilla, Hay-McCutcheon, Marcia, University of Alabama. Dept. of Communicative Disorders.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Speech therapy; Computer science; Augmentative and Alternative Communicaiton; HMM-based speech synthesis; Prosody; Real-time; Signal processing; Text to speech
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kassas, N. B. (2014). Real-time prosodic aspects of text generated speech. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/120394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Kassas, Nure Biane. “Real-time prosodic aspects of text generated speech.” 2014. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/120394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Kassas, Nure Biane. “Real-time prosodic aspects of text generated speech.” 2014. Web. 22 Apr 2021.
Vancouver:
Kassas NB. Real-time prosodic aspects of text generated speech. [Internet] [Thesis]. University of Alabama; 2014. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/120394.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Kassas NB. Real-time prosodic aspects of text generated speech. [Thesis]. University of Alabama; 2014. Available from: http://purl.lib.ua.edu/120394
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
2.
Mahawanniarachchi, Padmal Sathyajith.
P-algebras and Q-algebras.
Degree: 2010, University of Alabama
URL: http://purl.lib.ua.edu/21310
► We define two classes of algebras P- and Q-, which are derived from the definitions of BCK- and BCI- algebras. The birth of P-algebras is…
(more)
▼ We define two classes of algebras P- and Q-, which are derived from the definitions of BCK- and BCI- algebras. The birth of P-algebras is based on the symmetric difference in set theory. We prove that the class of P-algebras is a variety, and the definition of P-algebras is an alternative definition for groups of exponent 2, which we call P-groups. The class of Q-algebras consists of a combination of three axioms of BCK- and P- algebras. We study the relationship among P-, Q- and BCI- algebras. The theory of P- and Q- algebras is developed parallel to the theory of BCK- and BCI- algebras. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Neggers, Joseph, Brown, Marcus, Allen, Paul, Evans, Martin, Trent, Tavan, University of Alabama. Dept. of Mathematics.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Mathematics; BCI-Algebras; BCK-Algebras; Groups; P-Algebras; Q-Algebras
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mahawanniarachchi, P. S. (2010). P-algebras and Q-algebras. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/21310
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Mahawanniarachchi, Padmal Sathyajith. “P-algebras and Q-algebras.” 2010. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/21310.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Mahawanniarachchi, Padmal Sathyajith. “P-algebras and Q-algebras.” 2010. Web. 22 Apr 2021.
Vancouver:
Mahawanniarachchi PS. P-algebras and Q-algebras. [Internet] [Thesis]. University of Alabama; 2010. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/21310.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Mahawanniarachchi PS. P-algebras and Q-algebras. [Thesis]. University of Alabama; 2010. Available from: http://purl.lib.ua.edu/21310
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
3.
Greenlee, Eric T.
Expert enhancement of spatial perception in the face of uncertainty.
Degree: 2013, University of Alabama
URL: http://purl.lib.ua.edu/89984
► The current study expands upon previous research that has demonstrated transfer of training from action video games (AVGs) to laboratory tasks that require visual selective…
(more)
▼ The current study expands upon previous research that has demonstrated transfer of training from action video games (AVGs) to laboratory tasks that require visual selective attention (Green, Li & Bavelier, 2009 for review). Here, the potential of AVG training was further examined by measuring visuo-spatial discrimination performance and auditory-spatial discrimination performance under varying conditions of stimulus uncertainty. To this end, 46 participants (23 expert AVG players, 23 novices) completed a visual and an auditory discrimination task, and accuracy and reaction times were recorded. Expert participants were expected to possess superior discrimination skills overall and were expected to be less affected by stimulus ambiguity. Neither mean error rate nor mean reaction time differed due to group expertise level, and both experts and novices were equally slowed and made less accurate when stimulus ambiguity was increased. Despite the lack of mean group differences, experts demonstrated faster reaction times during the visual discrimination task than during the auditory discrimination task, whereas novices did not. This interaction suggests that AVG training results in enhancement to spatial discrimination skills selectively in the visual modality, while spatial auditory processes are unaffected. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Boles, David B., Brown, Marcus E., Roskos, Beverly B., University of Alabama. Dept. of Psychology.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Cognitive psychology; Action Video Game; Perceptual Expertise; Spatial Perception
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Greenlee, E. T. (2013). Expert enhancement of spatial perception in the face of uncertainty. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/89984
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Greenlee, Eric T. “Expert enhancement of spatial perception in the face of uncertainty.” 2013. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/89984.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Greenlee, Eric T. “Expert enhancement of spatial perception in the face of uncertainty.” 2013. Web. 22 Apr 2021.
Vancouver:
Greenlee ET. Expert enhancement of spatial perception in the face of uncertainty. [Internet] [Thesis]. University of Alabama; 2013. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/89984.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Greenlee ET. Expert enhancement of spatial perception in the face of uncertainty. [Thesis]. University of Alabama; 2013. Available from: http://purl.lib.ua.edu/89984
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
4.
Xiao, Zhifeng.
Design and analysis of accountable networked and distributed systems.
Degree: 2013, University of Alabama
URL: http://purl.lib.ua.edu/89975
► This dissertation focuses on the design and analysis of accountable computing for a wide range of networked systems with affordable expense. The central idea is…
(more)
▼ This dissertation focuses on the design and analysis of accountable computing for a wide range of networked systems with affordable expense. The central idea is to incorporate accountability, a long-neglected security objective, into the design and implementation of modern computing systems. Broadly speaking, accountability in the cyber-security domain means that every entity ought to be held responsible for its behavior, and that there always exists undeniable and verifiable evidence linking each event to the liable entities. This dissertation studies accountable computing in three different contexts, including traditional distributed systems, cloud computing, and the Smart Grid. We first propose a quantitative model called P-Accountability to assess the degree of system accountability. P-Accountability consists of a flat model and a hierarchical model. Our results show that P-Accountability is an effective metric to evaluate general distributed systems such as PeerReview [1] in terms of accountability. Next, we develop Accountable MapReduce for cloud computing to prevent malicious working machines from manipulating the processing results. To achieve this goal, we set up a group of auditors to perform an Accountability-Test (A-test) that checks all working machines and detects malicious nodes in real time. Finally, we investigate the accountability issues in the neighborhood area smart grid. A mutual inspection scheme is presented to enable non-repudiation for metering. In addition, we propose and analyze a suite of algorithms to identify malicious meters for the detection of energy theft. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Xiao, Yang, Brown, Marcus, Hong, Xiaoyan, Zhang, Jingyuan, Li, Shuhui, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Accountability; Cloud; Distributed system; MapReduce; Smart Grid
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Xiao, Z. (2013). Design and analysis of accountable networked and distributed systems. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/89975
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Xiao, Zhifeng. “Design and analysis of accountable networked and distributed systems.” 2013. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/89975.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Xiao, Zhifeng. “Design and analysis of accountable networked and distributed systems.” 2013. Web. 22 Apr 2021.
Vancouver:
Xiao Z. Design and analysis of accountable networked and distributed systems. [Internet] [Thesis]. University of Alabama; 2013. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/89975.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Xiao Z. Design and analysis of accountable networked and distributed systems. [Thesis]. University of Alabama; 2013. Available from: http://purl.lib.ua.edu/89975
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
5.
Dawson, Shameka.
Facilitating operator interaction with quality of surveillance multi-robot systems.
Degree: 2012, University of Alabama
URL: http://purl.lib.ua.edu/81387
► Robotic systems are becoming more practical in military applications. In fact, unmanned aerial vehicles (UAVs) are being used for surveillance and reconnaissance missions. Using UAVs…
(more)
▼ Robotic systems are becoming more practical in military applications. In fact, unmanned aerial vehicles (UAVs) are being used for surveillance and reconnaissance missions. Using UAVs for surveying a region of interest can increase situational awareness and decrease human casualty by allowing the operator to view the video feeds from the UAVs. However, current systems utilize complex one (or multiple) operator/one robot interfaces. In addition, human-in-the-loop models create issues because human operators tend to intervene more frequently if they do not trust the system or their expectations of the autonomy are not met. As a result, excessive or inept human intervention could negatively affect workload, situational awareness, and performance. This dissertation is aimed at allowing a single operator to efficiently manage multiple UAVs and interact effectively with higher levels of autonomy. By providing the operator with a mechanism to interact with the autonomy and aid in decision making, the operator becomes a part of the autonomous team. Contributions of this dissertation related to facilitating operator interaction with multi-robot surveillance systems include: (1) knowledge that trust is more than an understanding that the actions of an autonomous team are rational, but related to experiencing the actions' rationale; (2) a novel approach to teaming based on spatial and temporal environmental cues; and (3) the design and implementation of a testbed to measure the effect of the operator teaming with an autonomous system. Studies are used to evaluate the system and elucidate factors that affect operator trust. Results suggest that a human operator can team with multiple robots and effectively interact with higher levels of autonomy by experiencing the autonomous team's rationale using environmental cues. This approach using the spatial and temporal environmental cues was also found to promote trust, lower workload, and increase situational awareness while not degrading task performance. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Anderson, Monica, Brown, Marcus, Gray, Jeff, Hong, Xiaoyan, Hu, Fei, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Robotics; Computer science; Autonomy; Human-robot interaction; Multi-robot systems; Surveillance systems; Trust; User Interface
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dawson, S. (2012). Facilitating operator interaction with quality of surveillance multi-robot systems. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/81387
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dawson, Shameka. “Facilitating operator interaction with quality of surveillance multi-robot systems.” 2012. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/81387.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dawson, Shameka. “Facilitating operator interaction with quality of surveillance multi-robot systems.” 2012. Web. 22 Apr 2021.
Vancouver:
Dawson S. Facilitating operator interaction with quality of surveillance multi-robot systems. [Internet] [Thesis]. University of Alabama; 2012. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/81387.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dawson S. Facilitating operator interaction with quality of surveillance multi-robot systems. [Thesis]. University of Alabama; 2012. Available from: http://purl.lib.ua.edu/81387
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
6.
Islam, Md Ashfakul.
Database consistency in cloud databases.
Degree: 2013, University of Alabama
URL: http://purl.lib.ua.edu/89978
► Cloud storage service is currently becoming a very popular solution for medium-sized and startup companies. However, there are still few suitable solutions being offered to…
(more)
▼ Cloud storage service is currently becoming a very popular solution for medium-sized and startup companies. However, there are still few suitable solutions being offered to deploy transactional databases in a cloud platform. The maintenance of ACID (Atomicity, Consistency, Isolation and Durability) properties is the primary obstacle to the implementation of transactional cloud databases. The main features of cloud computing: scalability, availability and reliability are achieved by sacrificing consistency. The cost of consistency is one of the key issues in cloud transactional databases that must be addressed. While different forms of consistent states have been introduced, they do not address the needs of many database applications. In this dissertation we propose a tree-based consistency approach, called TBC, that reduces interdependency among replica servers to minimize the response time of cloud databases and to maximize the performance of those applications. We compare different techniques of maintaining consistency, including the classic approach, the quorum approach and our tree-based consistency approach. We identify the key controlling parameters of consistency maintenance in cloud databases and study the behavior of the different techniques with respect to those parameters. Experimental results indicate that our TBC approach reduces interdependency between data replicas and has good performance. We also implement a transaction management system using TBC as the consistency approach. We have designed a hierarchical lock manager that is able to work at a variable granularity level and allow much more concurrent access to the data items than regular lock managers. The TBC transaction management system ensures serializability and guarantees the ACID properties. The common isolation problems in transaction management are prevented, and we prove that the scenarios of dirty read, unrepeatable read and dirty write or lost update will never occur in concurrent execution of the transactions. We also present an efficient auto-scaling feature for the proposed transaction manager. Our experimental results shows that TBC has better response time than other approaches regardless of the arrival rate, read-write ratio, variation in data selection preference or database size. The Tree-Based Consistency approach is a viable solution for ACID transactional database management in a cloud. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Vrbsky, Susan, Dixon, Brandon, Brown, Marcus, Zhang, Jingyuan, Jukic, Nenad, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Auto Scaling; Cloud Database; Consistency; Database Transaction; Lock Tree; Serializability
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Islam, M. A. (2013). Database consistency in cloud databases. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/89978
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Islam, Md Ashfakul. “Database consistency in cloud databases.” 2013. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/89978.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Islam, Md Ashfakul. “Database consistency in cloud databases.” 2013. Web. 22 Apr 2021.
Vancouver:
Islam MA. Database consistency in cloud databases. [Internet] [Thesis]. University of Alabama; 2013. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/89978.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Islam MA. Database consistency in cloud databases. [Thesis]. University of Alabama; 2013. Available from: http://purl.lib.ua.edu/89978
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
7.
Dillard, Michael.
Transfer of training and the role of mental workload in expert performance.
Degree: 2012, University of Alabama
URL: http://purl.lib.ua.edu/55031
► There is a need to understand how to maximize skill development when training operators to undertake vital operational assignments (e.g., flying aircraft). At present, there…
(more)
▼ There is a need to understand how to maximize skill development when training operators to undertake vital operational assignments (e.g., flying aircraft). At present, there is much debate in the training community over how to best train these operators and achieve maximum skill transfer, such as whether training should focus on recreating the target task or whether there are benefits to training with subcomponents of the target task. Training with subcomponents can be simpler, cheaper, and therefore more accessible than training with a complex target task, and researchers have found performance gains when training with subcomponents (Ash & Holding, 1990; Gopher, Weil, & Bareket, 1994; Whaley & Fisk, 1993). Instead of utilizing subcomponents of a complex target task, the present study investigated the mental resources required to perform a target task - termed resource training. Given that there are established inventories for breaking down the demand a target task places on different resources, such as the Multiple Resources Questionnaire (Boles & Adair, 2001a, b), this is a logical endeavor. Participants alternated back and forth between a training task and a complex video game, Everyday Shooter, four times a day over two days. The training tasks were previously shown to heavily tax a specific resource, and participants either trained a task sharing many critical resources, or few critical resources, with the video game. In addition to assessing the feasibility of resource training, the present study also assessed the effect of providing metacognitive instructions and examined the role of expertise by including video game experts. Successful transfer was noted for those training the task that shared more critical resources with the target task, providing an instance of transfer via resource training. Superior performance may have been achieved via maintained critical workload, as the group that improved over days also maintained critical workload over days while noncritical workload declined. Importantly, this improvement was only noted when standard instructions were provided. The additional instructions, which pointed out both structural and resource-based similarities between the training task and the target task, Everyday Shooter, were found to be detrimental to performance. From a methodological standpoint, this suggests that participants do not need to be explicitly instructed why certain tasks are being trained in tandem. The alternating design required participants to alternate between the training task and target task, instead of massing together consecutive training sessions before performing the target task. The alternating design is apparently a powerful means of producing transfer, as it led to better performance on the target task and likely removed the need for additional instructions regarding task similarities. Also, recent investigations in our laboratory finding evidence of transfer have employed this alternating design (e.g., Boles & Penn, 2010), while studies have struggled to find consistent…
Advisors/Committee Members: Boles, David B., Black, Sheila R., Brown, Marcus E., Scogin, Forrest R., Ward, Thomas B., University of Alabama. Dept. of Psychology.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Experimental psychology; Expertise; Mental Workload; Metacognitive Instruction; Multiple Resources; Transfer of Training; Video Games
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dillard, M. (2012). Transfer of training and the role of mental workload in expert performance. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/55031
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dillard, Michael. “Transfer of training and the role of mental workload in expert performance.” 2012. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/55031.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dillard, Michael. “Transfer of training and the role of mental workload in expert performance.” 2012. Web. 22 Apr 2021.
Vancouver:
Dillard M. Transfer of training and the role of mental workload in expert performance. [Internet] [Thesis]. University of Alabama; 2012. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/55031.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dillard M. Transfer of training and the role of mental workload in expert performance. [Thesis]. University of Alabama; 2012. Available from: http://purl.lib.ua.edu/55031
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
8.
Dillon, Edward.
Measuring the effects of low assistive vs. moderately assistive environments on novice programmers.
Degree: 2012, University of Alabama
URL: http://purl.lib.ua.edu/77785
► Improving the novice's experience with programming has been an important research topic for some time. The high attrition rate of CS majors continues to be…
(more)
▼ Improving the novice's experience with programming has been an important research topic for some time. The high attrition rate of CS majors continues to be a problem. Incoming majors are being exposed to programming but many are driven away from the field. As a way to engage novices with programming, many CS departments have adopted visual environments. However, not all novices are taught to program using visual environments. Typically, students are introduced to programming through either a visual or command line environment at the beginning stages of a CS curriculum. The features in standard command line environments are not as assistive to programmers as visual environments. Novices must learn both language syntax and semantics while navigating the file system and compilation tools. On the other hand, visual environments with highly assistive features could constrict a novice to learn a fixed set of foundational programming skills that exclude exposure to syntax checking, compilation and file systems. Novices will eventually need to move to a less assistive environment to round out their skill set. The objective of this research was to determine if certain environments are more appropriate for teaching novices how to program, based on their respective levels of feature assistance. There are anecdotally based motivations for using either tools with low assistive features like command line environments (promotes acquisition of useful mental models) or tools with moderate to high assistive features like visual environments (engages novices while programming). Unfortunately, no systematic study exists that supports either supposition. This research was composed of three studies for evaluating environments with varying feature sets: a high school outreach, a CS1-Laboratory Study, and a CS1-Study. Engagement, comprehension, efficiency, and usability were used as measures to evaluate the environments during these studies. Overall, this research showed that a moderately assistive environment imposes a lower learning curve for novices, while a low assistive environment appears to broaden their understanding of programming. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Brown, Marcus, Anderson-Herzog, Monica, Vrbsky, Susan, DePasquale, Peter, Robinson, Cecil, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Educational technology; Pedagogy; Feature Assistiveness; Mental Models; Novice Programming; Programming Environments
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dillon, E. (2012). Measuring the effects of low assistive vs. moderately assistive environments on novice programmers. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/77785
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dillon, Edward. “Measuring the effects of low assistive vs. moderately assistive environments on novice programmers.” 2012. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/77785.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dillon, Edward. “Measuring the effects of low assistive vs. moderately assistive environments on novice programmers.” 2012. Web. 22 Apr 2021.
Vancouver:
Dillon E. Measuring the effects of low assistive vs. moderately assistive environments on novice programmers. [Internet] [Thesis]. University of Alabama; 2012. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/77785.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dillon E. Measuring the effects of low assistive vs. moderately assistive environments on novice programmers. [Thesis]. University of Alabama; 2012. Available from: http://purl.lib.ua.edu/77785
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
9.
Olteanu, Alina.
Network security:
design, analysis and tradeoff evaluation.
Degree: 2009, University of Alabama
URL: http://purl.lib.ua.edu/92
► Energy efficiency is an essential requirement for all wireless devices. Recent developments in wireless sensor networks (WSNs), wireless local area networks (WLANs) and wireless personal…
(more)
▼ Energy efficiency is an essential requirement for all wireless devices. Recent developments in wireless sensor networks (WSNs), wireless local area networks (WLANs) and wireless personal area networks (WPANs) have raised a demand for energy-efficient algorithms and energy-efficient medium access control (MAC) protocols. When considering security in this context, additional overhead is added to the network and efforts must to be made to minimize the extra load while at the same time achieving the desired level of security. Security attacks in the Internet are linked to a different set of vulnerabilities. The complex architecture of the Internet spanning over different administrative domains and legal systems makes it easy for attackers to conceal the source of the attack and preserve their anonymity. This dissertation addresses several important issues in network security and performance including intrusion detection, cipher design, security overhead analysis and tracing, as follows. We first propose a model for intrusion detection in WSNs, which optimizes network coverage and detection while minimizing the number of sensors and energy consumption. We then integrate a security mechanism into the sensor network in order to achieve secure communication. Specifically, we propose a lightweight block cipher based on a multiple recursive generator (MRG) which is suitable for WSN and RFID where power consumption, bandwidth, memory and storage space are critical. Next, we consider security in WLANs and WPANs and we apply the advanced encryption standard (AES) cipher to ensure secure transmission of frames. We integrate AES encryption at the MAC layer of 802.11 WLANs and 802.15.3 UWB WPANs, respectively, and study the overhead introduced by AES in this context. Finally, we analyze a type of security attack in the Internet where the intruder uses a chain of host machines before attacking the target. We discuss two mechanisms for tracing intruders in the Internet, one based on thumbprinting, and the other on a timestamping technique of transmission activities. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Xiao, Yang, Brown, Marcus, Hong, Xiaoyan, Zhang, Jingyuan, Wu, Zhijian, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer Science; cipher; encryption; intrusion detection; optimization; security; sensor network
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Olteanu, A. (2009). Network security:
design, analysis and tradeoff evaluation. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/92
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Olteanu, Alina. “Network security:
design, analysis and tradeoff evaluation.” 2009. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/92.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Olteanu, Alina. “Network security:
design, analysis and tradeoff evaluation.” 2009. Web. 22 Apr 2021.
Vancouver:
Olteanu A. Network security:
design, analysis and tradeoff evaluation. [Internet] [Thesis]. University of Alabama; 2009. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/92.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Olteanu A. Network security:
design, analysis and tradeoff evaluation. [Thesis]. University of Alabama; 2009. Available from: http://purl.lib.ua.edu/92
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
10.
Dillon, Edward, Jr.
Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment.
Degree: 2009, University of Alabama
URL: http://purl.lib.ua.edu/107
► When novice programmers begin programming, they face many problems due to the lack of programming experience. Integrated Development Environments are used as a way to…
(more)
▼ When novice programmers begin programming, they face many problems due to the lack of programming experience. Integrated Development Environments are used as a way to help novices become more effective at learning to program. The question is whether or not such an environment is more effective when compared to a command line/console environment. Therefore, this study tried to address this question by performing interviews with students who were using these environments. This study was composed of two groups of undergraduate students who were taking courses in Computer Science. Group one consisted of students who were involved in a course sequence beginning with the Microsoft Visual Studio IDE, then a command line environment for the last course in the sequence. The second group started programming with a command line environment. Interviews were conducted with both groups in order to gain information about these environments. The information retrieved showed that the Microsoft Visual Studio IDE is favored based on the students' responses to the questions. However, there was not enough significant differences amongst the results to say that an IDE in general is better than a command line environment. It was the intent that this information provided not only background information but also served as potential foundational evidence for determining which environment may be more suitable for novice programmers to use for programming. This information will also be used as a basis for further research and studies in this area. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Brown, Marcus, Smith, Randy K., Carver, Jeffrey C., Robinson, Cecil, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer Science; command line; course; IDE; new; original; sequence
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dillon, Edward, J. (2009). Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/107
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dillon, Edward, Jr. “Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment.” 2009. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/107.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dillon, Edward, Jr. “Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment.” 2009. Web. 22 Apr 2021.
Vancouver:
Dillon, Edward J. Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment. [Internet] [Thesis]. University of Alabama; 2009. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/107.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dillon, Edward J. Which environment is more suitable for novice programmers:
editor/command line/console environment vs. Integrated Development Environment. [Thesis]. University of Alabama; 2009. Available from: http://purl.lib.ua.edu/107
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
11.
Wagner, Amber.
Programming by voice:
a hands-free approach for motorically challenged children.
Degree: 2015, University of Alabama
URL: http://purl.lib.ua.edu/127915
► Computer Science (CS) educators frequently develop new methodologies, languages, and programming environments to teach novice programmers the fundamental concepts of CS. A recent trend has…
(more)
▼ Computer Science (CS) educators frequently develop new methodologies, languages, and programming environments to teach novice programmers the fundamental concepts of CS. A recent trend has focused on new environments that reduce the initial challenges associated with the heavy syntax focus of textual programming languages. There are numerous Initial Programming Environments (IPEs) available that have been created for student use that in some cases have fostered self-discovery and inquiry-based exploration. In this dissertation, three IPEs are discussed: Scratch (2015), Lego Mindstorms (2015), and Blockly (2015). Although the block-based nature of IPEs can be helpful for learning concepts in CS, a small group of students (approximately 5%) is being left out from learning experiences and engagement in CS due to block-based environments’ dependence on the Windows Icon Mouse Pointer (WIMP) metaphor. Block-based environments often require the use of both a mouse and keyboard, which motorically challenged users often are unable to operate. Based on research performed and presented in this dissertation, a Vocal User Interface (VUI) is a viable solution that offers a “Programming by Voice” (PBV) capability (i.e., a capability to describe a program without using a keyboard or mouse). However, adapting legacy applications can be time consuming, particularly, if multiple applications (such as the three IPEs previously mentioned) require specialized VUIs. Each environment has its own visual layout and its own commands; therefore, each application requires a different VUI. In order to create a more generic solution, a Domain-Specific Language (DSL) can be applied to create a semi-automated process allowing a level of abstraction that captures the specific needs of each IPE. From the specification of each IPE, a customized VUI can be generated that integrates with the legacy application in a non-invasive manner. The nine chapters included in this dissertation were motivated by the following four research questions: 1. How can we improve initial programming instruction? 2. Can all children participate in programming instruction? 3. How do we implement PBV to allow children to take advantage of creative, block-based programming environments? 4. What are some potential ideas that can assist in generalizing the process of voice enabling IPEs? (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Gray, Jeff, Kraft, Nicholas, Vrbsky, Susan, Brown, Marcus, Smith, Randy, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Accessible Computing; Computer Science Education; Human Computer Interaction
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Wagner, A. (2015). Programming by voice:
a hands-free approach for motorically challenged children. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/127915
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wagner, Amber. “Programming by voice:
a hands-free approach for motorically challenged children.” 2015. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/127915.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wagner, Amber. “Programming by voice:
a hands-free approach for motorically challenged children.” 2015. Web. 22 Apr 2021.
Vancouver:
Wagner A. Programming by voice:
a hands-free approach for motorically challenged children. [Internet] [Thesis]. University of Alabama; 2015. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/127915.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wagner A. Programming by voice:
a hands-free approach for motorically challenged children. [Thesis]. University of Alabama; 2015. Available from: http://purl.lib.ua.edu/127915
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
12.
Zunnurhain, Kazi.
FAPA:
flooding attack protection architecture in a cloud system.
Degree: 2014, University of Alabama
URL: http://purl.lib.ua.edu/116189
► The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical,…
(more)
▼ The rate of acceptance of clouds each year is making cloud computing the leading IT computational technology. While cloud computing can be productive and economical, it is still vulnerable to different types of external threats, one of which is a Denial of Service (DoS) attack. DoS attacks have long been an open security problem of the internet. Most proposed solutions to address DoS attacks require upgrades in routers, modification in the BGP (Border Gateway Protocol), usage of additional control bits in the IP packets, or adjustments to legacy routers in the routing path. It is extremely difficult to manipulate all these criteria, considering that the internet, and potentially a cloud, consists of a very large number of autonomous systems with routers from different vendors deployed over decades. Authentication protocols are typically implemented by some of the leading companies manufacturing DoS prevention routers. However, authentication protocols and embedded digital signatures are very expensive and vulnerable. This is contrary to the benefits of renting a cloud system, which is to save capital expenditure as well as operational expenditure. Rather than depending on cloud providers, we proposed a model, called FAPA (Flooding Attack Protection Architecture), to detect and filter packets when DoS attacks occur. FAPA can be deployed at different levels of the system, such as at the user's end. FAPA can run locally on top of the client's terminal and is independent of the provider's cloud machine. There is no need to deploy any expensive packet capturing tools nor does it require any embedded digital signature inside the packets. There is no additional charge from the provider's end since the application runs in the customer's end. Moreover, automatic message propagation invokes the cloud server to trace the source or adversary. In FAPA, detection of denial of service is handled by the periodic analysis of the traffic behavior from the raw packets. It generates an alarm if any DoS attack is detected and removes flooding by filtering. Because FAPA is employed on the client's side, customers have control over traffic trends, which is absent in other DoS prevention approaches. FAPA is comprised of five individual modules, where each module has an assigned task in detecting DoS attacks and removing threats by filtering the spoof packets. A module fetches the traffic packets and does the unwrapping. Another module records the pertinent parameters of network packets. Implementation of a FAPA prototype and experimental results has demonstrated the feasibility of FAPA. From our initial experiments we observed that in the event of a DoS attack, some of the network parameters change. Hence, in FAPA a separate module is dedicated for storing information about traffic behavior. If FAPA observes any inconsistent traffic behavior, it invokes the filtering modules to remove the compromised network packets. FAPA filtering detects the threat by using previously recorded information. FAPA filtering was implemented for a cluster…
Advisors/Committee Members: Vrbsky, Susan, Hasan, Ragib, Hong, Xiaoyan, Brown, Marcus, Zhang, Jingyuan, Vrbsky, Susan, Hasan, Ragib, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Cloud; Compromised; Distributed Denial of Service; Private Cloud; Sibling; Virtual Machine
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zunnurhain, K. (2014). FAPA:
flooding attack protection architecture in a cloud system. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/116189
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Zunnurhain, Kazi. “FAPA:
flooding attack protection architecture in a cloud system.” 2014. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/116189.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Zunnurhain, Kazi. “FAPA:
flooding attack protection architecture in a cloud system.” 2014. Web. 22 Apr 2021.
Vancouver:
Zunnurhain K. FAPA:
flooding attack protection architecture in a cloud system. [Internet] [Thesis]. University of Alabama; 2014. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/116189.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Zunnurhain K. FAPA:
flooding attack protection architecture in a cloud system. [Thesis]. University of Alabama; 2014. Available from: http://purl.lib.ua.edu/116189
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
13.
Greenlee, Eric T.
Factor analysis of lateralized auditory perceptual resources.
Degree: 2015, University of Alabama
URL: http://purl.lib.ua.edu/125629
► The primary goal of this study was to identify independent, hemispherically lateralized auditory perceptual resources so that they could be used to expand the Multiple…
(more)
▼ The primary goal of this study was to identify independent, hemispherically lateralized auditory perceptual resources so that they could be used to expand the Multiple Resources Questionnaire (MRQ), an existing measure that assesses the demands that a task places upon multiple resources (Boles & Adair, 2001a). Researchers have demonstrated that the MRQ's subjective ratings of resource demand can be used to predict multi-task interference, and the measure has demonstrated advantages over other subjective measures of task demand (for review Boles & Dillard, in press). Yet, of the 13 perceptual resources represented by the MRQ, only two are auditory. This shortage of auditory resources in the MRQ prevents the accurate measurement of tasks presented within the auditory modality, and the diagnosticity of the MRQ would likely benefit from the addition of items representing auditory resources (Finomore et al., 2008). The methods used to identify auditory resources in the present study were the same as those used to identify the bulk of the resources that are currently represented within the MRQ. A comprehensive survey of auditory perceptual research was conducted to identify the types of processing and tasks that appear to demand hemispherically lateralized perceptual resources. Based on this literature review, 13 tasks were selected for use in the current study. These tasks were administered as a test battery to 124 right-handed, nonmusicians. All significant, reliable performance asymmetries produced by these tasks were factor analyzed in order to identify underlying perceptual resources. Exploratory factor analysis revealed evidence for a novel right-lateralized Auditory Spectral Pitch resource which is specialized for processing and perceiving pitch based on the harmonic content in complex sounds. Results also indicated the possible existence of a right-lateralized Auditory Intensity resource, which is specialized for the processing of perceived intensity (i.e. loudness). However, the existence and independence of this Auditory Resource is suggested cautiously, since the data used to infer the resource was relatively unreliable. Additionally, two previously identified resources were evident in the current results: the Auditory Linguistic and Visual Temporal resources. The theoretical implications and human factors applications of these findings are discussed. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Boles, David B., Brown, Marcus E., Merrill, Edward C., Parmelee, Patricia A., Roskos, Beverly, University of Alabama. Dept. of Psychology.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Cognitive psychology; Neurosciences; Auditory; Hemispheric Asymmetry; Multiple Resources; Perception; Workload
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Greenlee, E. T. (2015). Factor analysis of lateralized auditory perceptual resources. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/125629
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Greenlee, Eric T. “Factor analysis of lateralized auditory perceptual resources.” 2015. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/125629.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Greenlee, Eric T. “Factor analysis of lateralized auditory perceptual resources.” 2015. Web. 22 Apr 2021.
Vancouver:
Greenlee ET. Factor analysis of lateralized auditory perceptual resources. [Internet] [Thesis]. University of Alabama; 2015. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/125629.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Greenlee ET. Factor analysis of lateralized auditory perceptual resources. [Thesis]. University of Alabama; 2015. Available from: http://purl.lib.ua.edu/125629
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alabama
14.
Heaton, Dustin.
Software engineering for enabling scientific software development.
Degree: 2015, University of Alabama
URL: http://purl.lib.ua.edu/128005
► Scientific software is code written by scientists for the purpose of doing research. While the results of this software development have been widely published, there…
(more)
▼ Scientific software is code written by scientists for the purpose of doing research. While the results of this software development have been widely published, there has been relatively little publication of the development of this software. There have been even fewer publications that look at the software engineering aspects of scientific software development and fewer still that have suggested software engineering techniques that will help scientists develop the software that is relied on for much of our modern knowledge. The software engineers who have studied the development processes of scientific software developers agree that scientists would be able to produce better software if they had the knowledge and familiarity to use specific software engineering practices. The primary focus of this dissertation is to provide that knowledge to scientific software developers in order to better enable them to produce quality software as efficiently as possible. In order to achieve this focus, this dissertation has three aspects. First, this dissertation provides a literature review of the claims that have been made in the software engineering and scientific software literature culminating in a list of claims about software engineering practices. Scientific software developers can use this list to find practices they are unaware of that should prove useful to their development. Additionally, software engineers can use the list to help determine what practices need support for the scientists to be able to take advantage of them. Second, this dissertation provides a series of surveys that capture the current state of software engineering knowledge in the scientific software development community. The results of these surveys show that scientific software developers are unfamiliar with many of the practices that could help them address their most challenging issues. Third, this dissertation provides examples that show, with support from software engineers, scientific software developers can take advantage of practices that have proven useful in traditional software engineering and increase the quality of their work without requiring an overwhelming amount of extra work. (Published By
University of
Alabama Libraries)
Advisors/Committee Members: Carver, Jeffrey C., Gray, Jeff, Smith, Randy, Brown, Marcus, Bernholdt, David, University of Alabama. Dept. of Computer Science.
Subjects/Keywords: Electronic Thesis or Dissertation; – thesis; Computer science; Code Review; Computational Engineering; Computational Science; Software Engineering; Testing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Heaton, D. (2015). Software engineering for enabling scientific software development. (Thesis). University of Alabama. Retrieved from http://purl.lib.ua.edu/128005
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Heaton, Dustin. “Software engineering for enabling scientific software development.” 2015. Thesis, University of Alabama. Accessed April 22, 2021.
http://purl.lib.ua.edu/128005.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Heaton, Dustin. “Software engineering for enabling scientific software development.” 2015. Web. 22 Apr 2021.
Vancouver:
Heaton D. Software engineering for enabling scientific software development. [Internet] [Thesis]. University of Alabama; 2015. [cited 2021 Apr 22].
Available from: http://purl.lib.ua.edu/128005.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Heaton D. Software engineering for enabling scientific software development. [Thesis]. University of Alabama; 2015. Available from: http://purl.lib.ua.edu/128005
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
.