MSCS Faculty Research and PublicationsCopyright (c) 2016 Marquette University All rights reserved.
http://epublications.marquette.edu/mscs_fac
Recent documents in MSCS Faculty Research and Publicationsen-usTue, 31 May 2016 13:01:52 PDT3600Characterizations of NWP, ETGR and TWL Distributions
http://epublications.marquette.edu/mscs_fac/405
http://epublications.marquette.edu/mscs_fac/405Tue, 31 May 2016 12:50:32 PDT
Utilizing a simple relationship between two truncated moments as well as certain functions of the 1st and of the nth order statistics, we characterize three extended classes of distributions proposed in (2015).
]]>
Gholamhossein HamedaniCharacterizations of Transmuted Complementary Weibull Geometric Distribution
http://epublications.marquette.edu/mscs_fac/404
http://epublications.marquette.edu/mscs_fac/404Tue, 31 May 2016 12:43:39 PDT
We present certain characterizations of a recently introduced distribution (Afify et al., 2014), called Transmuted Complementary Weibull Geometric distribution based on: hazard function ; a simple relation between two truncated moments. We like to mention that the characterization which is expressed in terms of the ratio of truncated moments is stable in the sense of weak convergence. It does not require a closed form for the cumulative distribution function and serves as a bridge between a first order differential equation and probability.
]]>
Gholamhossein HamedaniThe Transmuted Exponentiated Generalized-G Family of Distributions
http://epublications.marquette.edu/mscs_fac/403
http://epublications.marquette.edu/mscs_fac/403Tue, 31 May 2016 12:26:16 PDT
We introduce a new class of continuous distributions called the transmuted exponentiated generalized-G family which extends the exponentiated generalized-G class introduced by Cordeiro et al. (2013). We provide some special models for the new family. Some of its mathematical properties including explicit expressions for the ordinary and incomplete moments, generating function, Rényi and Shannon entropies, order statistics and probability weighted moments are derived. The estimation of the model parameters is performed by maximum likelihood. The flexibility of the proposed family is illustrated by means of an applications to real dataset.
]]>
Haitham M. Yousof et al.Characterizations of Gamma Distribution via Sub-Independent Random Variables
http://epublications.marquette.edu/mscs_fac/402
http://epublications.marquette.edu/mscs_fac/402Tue, 31 May 2016 12:12:10 PDT
The concept of sub-independence is based on the convolution of the distributions of the random variables. It is much weaker than that of independence, but is shown to be sufficient to yield the conclusions of important theorems and results in probability and statistics. It also provides a measure of dissociation between two random variables which is much stronger than uncorrelatedness. Inspired by the excellent work of Jin and Lee (2014), we present certain characterizations of gamma distribution based on the concept of sub-independence.
]]>
Gholamhossein HamedaniSequencing of 15 622 Gene-bearing BACs Clarifies the Gene-dense Regions of the Barley Genome
http://epublications.marquette.edu/mscs_fac/401
http://epublications.marquette.edu/mscs_fac/401Thu, 07 Apr 2016 11:30:32 PDT
Barley (Hordeum vulgare L.) possesses a large and highly repetitive genome of 5.1 Gb that has hindered the development of a complete sequence. In 2012, the International Barley Sequencing Consortium released a resource integrating whole-genome shotgun sequences with a physical and genetic framework. However, because only 6278 bacterial artificial chromosome (BACs) in the physical map were sequenced, fine structure was limited. To gain access to the gene-containing portion of the barley genome at high resolution, we identified and sequenced 15 622 BACs representing the minimal tiling path of 72 052 physical-mapped gene-bearing BACs. This generated ~1.7 Gb of genomic sequence containing an estimated 2/3 of all Morex barley genes. Exploration of these sequenced BACs revealed that although distal ends of chromosomes contain most of the gene-enriched BACs and are characterized by high recombination rates, there are also gene-dense regions with suppressed recombination. We made use of published map-anchored sequence data from Aegilops tauschii to develop a synteny viewer between barley and the ancestor of the wheat D-genome. Except for some notable inversions, there is a high level of collinearity between the two species. The software HarvEST:Barley provides facile access to BAC sequences and their annotations, along with the barley–Ae. tauschii synteny viewer. These BAC sequences constitute a resource to improve the efficiency of marker development, map-based cloning, and comparative genomics in barley and related crops. Additional knowledge about regions of the barley genome that are gene-dense but low recombination is particularly relevant.
]]>
María Muñoz-Amatriaín et al.Architecture and Implementation of a Trust Model for Pervasive Applications
http://epublications.marquette.edu/mscs_fac/400
http://epublications.marquette.edu/mscs_fac/400Thu, 24 Mar 2016 09:53:17 PDT
Collaborative effort to share resources is a significant feature of pervasive computing environments. To achieve secure service discovery and sharing, and to distinguish between malevolent and benevolent entities, trust models must be defined. It is critical to estimate a device's initial trust value because of the transient nature of pervasive smart space; however, most of the prior research work on trust models for pervasive applications used the notion of constant initial trust assignment. In this paper, we design and implement a trust model called DIRT. We categorize services in different security levels and depending on the service requester's context information, we calculate the initial trust value. Our trust value is assigned for each device and for each service. Our overall trust estimation for a service depends on the recommendations of the neighbouring devices, inference from other service-trust values for that device, and direct trust experience. We provide an extensive survey of related work, and we demonstrate the distinguishing features of our proposed model with respect to the existing models. We implement a healthcare-monitoring application and a location-based service prototype over DIRT. We also provide a performance analysis of the model with respect to some of its important characteristics tested in various scenarios.
]]>
Sheikh Iqbal Ahamed et al.A Graph-Theoretic Approach to Compute Minimal Tiling Path from a Physical Map
http://epublications.marquette.edu/mscs_fac/399
http://epublications.marquette.edu/mscs_fac/399Fri, 18 Mar 2016 06:52:13 PDTSerdar Bozdag et al.Concept of Sub-Independence
http://epublications.marquette.edu/mscs_fac/398
http://epublications.marquette.edu/mscs_fac/398Wed, 09 Mar 2016 08:33:17 PST
Limit theorems as well as other well-known results in probability and statistics are often based on the distributions of the sums of independent random variables. The concept of sub-independence, which is weaker than that of independence, is shown to be sufficient to yield the conclusions of these theorems and results. It also provides a measure of dissociation between two random variables which is stronger than uncorrelatedness.
]]>
Gholamhossein HamedaniEqual and Full {0,1} - Matrix Ranks of Local Out-Tournaments
http://epublications.marquette.edu/mscs_fac/397
http://epublications.marquette.edu/mscs_fac/397Wed, 27 Jan 2016 09:09:20 PSTKim FactorDomination and Network Stability: An Application
http://epublications.marquette.edu/mscs_fac/396
http://epublications.marquette.edu/mscs_fac/396Wed, 27 Jan 2016 09:05:29 PSTKim FactorDigraphs with Isomorphic Underlying and Domination Graphs: Components of <em>K</em><sub>1</sub>, <em>K</em><sub>2</sub>, or <em>C</em><sub>4</sub> in <em>UG</em><sup>c</sup><em>(D)</em>
http://epublications.marquette.edu/mscs_fac/395
http://epublications.marquette.edu/mscs_fac/395Wed, 27 Jan 2016 09:01:20 PSTKim FactorDomination-Stable Forms of Complete Biorientations of Some Classes of Graphs
http://epublications.marquette.edu/mscs_fac/394
http://epublications.marquette.edu/mscs_fac/394Wed, 27 Jan 2016 08:55:22 PSTKim FactorPartial Domination Graphs of Extended Tournaments
http://epublications.marquette.edu/mscs_fac/393
http://epublications.marquette.edu/mscs_fac/393Wed, 27 Jan 2016 08:49:54 PSTKim FactorDomination Graphs of Compressed Tournaments
http://epublications.marquette.edu/mscs_fac/392
http://epublications.marquette.edu/mscs_fac/392Wed, 27 Jan 2016 08:42:50 PSTKim FactorBiclique Covers of Bigraphs and Digraphs and Minimum Semiring Ranks of {0,1}-Matrices
http://epublications.marquette.edu/mscs_fac/391
http://epublications.marquette.edu/mscs_fac/391Wed, 27 Jan 2016 08:27:41 PSTKim FactorSecurity in Pervasive Computing: Current Status and Open Issues
http://epublications.marquette.edu/mscs_fac/390
http://epublications.marquette.edu/mscs_fac/390Wed, 23 Dec 2015 13:05:08 PST
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation.
]]>
Munirul Haque et al.ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
http://epublications.marquette.edu/mscs_fac/389
http://epublications.marquette.edu/mscs_fac/389Wed, 23 Dec 2015 12:18:01 PST
To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of efficient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy attainability should also be maintained. ETS Self-healing service, an integral part of our developing middleware named MARKS (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing), holds promise for offering all of those functionalities.
]]>
Shameem Ahmed et al.Remarks on a Paper of Lee and Lim
http://epublications.marquette.edu/mscs_fac/388
http://epublications.marquette.edu/mscs_fac/388Wed, 23 Dec 2015 11:46:35 PST
Lee and Lim (2009) state three characterizations of Loamax, exponential and power function distributions, the proofs of which, are based on the solutions of certain second order non-linear differential equations. For these characterizations, they make the following statement : "Therefore there exists a unique solution of the differential equation that satisfies the given initial conditions". Although the general solution of their first differential equation is easily obtainable, they do not obtain the general solutions of the other two differential equations to ensure their claim via initial conditions. In this very short report, we present the general solutions of these equations and show that the particular solutions satisfying the initial conditions are uniquely determined to be Lomax, exponential and power function distributions respectively.
]]>
Gholamhossein Hamedani et al.Biclique Covers and Partitions of Digraphs: A Set Theoretical Approach
http://epublications.marquette.edu/mscs_fac/387
http://epublications.marquette.edu/mscs_fac/387Tue, 22 Dec 2015 06:33:27 PSTKim A. S. FactorLocal Out-Tournaments with Upset Tournament Strong Components II: Existence of Equal {0,1} - Matrix Ranks of less than <em>n</em>
http://epublications.marquette.edu/mscs_fac/386
http://epublications.marquette.edu/mscs_fac/386Thu, 17 Dec 2015 13:18:45 PSTKim A. S. Factor