Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, 2012 Purdue University
Virtualization In High-Performance Computing: An Analysis Of Physical And Virtual Node Performance, Glendon M. Jungels
Purdue Polytechnic Masters Theses
The process of virtualizing computing resources allows an organization to make more efficient use of it's resources. In addtion, this process enables flexibility that deployment on raw hardware does not. Virtualization, however, comes with a performance penalty. This study examines the performance of utilizing virtualization technology for use in high performance computing to determine the suitibility of using this technology. It makes use of a small (4 node) virtual cluster as well as a 4 node physical cluster. The impacts on input/output operation are examined as well as performance of each cluster using two widely utilized tools, NAS Parallel Benchmarks …
Sketching 3d Animation, 2012 Purdue University
Sketching 3d Animation, Innfarn Yoo
Department of Computer Graphics Technology Degree Theses
This thesis presents a method for creating natural 3D animation based on sketches. Our method provides novice and professional sketchers an easy, fast, and intuitive way to create three dimensional animations by drawing sketches, enhanced by strokes, and joint trajectory or rotation curves. It also allows searching massive databases of 3D animation as an application for motion capture system and major animation software. We extract 2D skeletons from strokes and find similar motion sequences by comparing all the important pre-generated key poses in database. To give the system more hints, users can draw joint trajectory and rotations curves that are …
Check Image Processing: Webp Conversion And Micr Scan Android Application, 2012 California Polytechnic State University - San Luis Obispo
Check Image Processing: Webp Conversion And Micr Scan Android Application, Trevor Bliss
Computer Engineering
As more users favor smartphones over computers for simple tasks, small businesses are constantly exploring mobile options to present to their customers. This write-up documents an Android application designed for a small company, which allows users to send pictures of checks to the company’s servers for processing. The picture is taken with the devices built-in camera and is converted to Google’s new image format, WebP. The company’s server processes the check and returns the check’s MICR code as a response. This application leverages the Android NDK and JNI to use Google’s open source image conversion libraries as well as socket …
Bluemote!, 2012 California Polytechnic State University - San Luis Obispo
Bluemote!, Philip Kaye
Computer Engineering
In today’s society, our mobile phones are an extremely useful device when we are on the go and away from our homes; however, when we return home, our smart phone becomes just a communication tool again. Home automation is inevitable, and it will find its way into every house. The first person to commercialize it to the point where it is as easy to set-up and as affordable as a home router will end up breaking this slow trend. The key to this success is the smart phone; this should end up being the most expensive piece of hardware for …
Kreative Outlets, 2012 California Polytechnic State University - San Luis Obispo
Kreative Outlets, Travis Crist, Steve Clark, Jason Peressini
Computer Engineering
With the widespread use of smart phones and the advancement of WiFi technologies, people now have the Internet at their fingertips at all times. Home automation and control has the possibility of becoming the next big technology that can utilize the abundant availability of the Internet. This paper documents the findings and results of a project aimed at developing the infrastructure needed for a home automation system that is accessible anywhere. We implemented a system that utilized a web enabled ethernet connection and RF wireless technology to control AC outlets and provide the user with feedback information about the status …
An Interactive Visualization Model For Analyzing Data Storage System Workloads, 2012 California Polytechnic State University, San Luis Obispo
An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri
Master's Theses
The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …
Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, 2012 University of Massachusetts Amherst
Scheduling Heuristics For Maximizing The Output Quality Of Iris Task Graphs In Multiprocessor Environment With Time And Energy Bounds, Rajeswaran Chockalingapuram Ravindran
Masters Theses 1911 - February 2014
Embedded real time applications are often subject to time and energy constraints. Real time applications are usually characterized by logically separable set of tasks with precedence constraints. The computational effort behind each of the task in the system is responsible for a physical functionality of the embedded system. In this work we mainly define theoretical models for relating the quality of the physical func- tionality to the computational load of the tasks and develop optimization problems to maximize the quality of the system subject to various constraints like time and energy. Specifically, the novelties in this work are three fold. …
Strongly Complete Logics For Coalgebras, 2012 Chapman University
Strongly Complete Logics For Coalgebras, Alexander Kurz, Jiří Rosický
Engineering Faculty Articles and Research
Coalgebras for a functor model different types of transition systems in a uniform way. This paper focuses on a uniform account of finitary logics for set-based coalgebras. In particular, a general construction of a logic from an arbitrary set-functor is given and proven to be strongly complete under additional assumptions. We proceed in three parts.
Part I argues that sifted colimit preserving functors are those functors that preserve universal algebraic structure. Our main theorem here states that a functor preserves sifted colimits if and only if it has a finitary presentation by operations and equations. Moreover, the presentation of the …
Kinect And 3d Gis In Archaeology, 2012 University of Nebraska-Lincoln
Kinect And 3d Gis In Archaeology, Heather Richards-Rissetto, Fabio Remondino, Jim Robersson, Jennifer Von Schwerin, Giorgio Agugiaro, Gabrio Girardi
Department of Anthropology: Faculty Publications
This paper explores the potential of using Microsoft's Kinect to create a low-cost and portable system to virtually navigate, through a prototype 3D GIS, the digitally reconstructed ancient Maya city and UNESCO World Heritage Site of Copan in Honduras. The 3D GIS, named QueryArch3D, was developed as part of the MayaArch3D project (http://mayaarch3d.unm.edu), which explores the possibilities of integrating databases and 3D digital tools for research and teaching on ancient architectures and landscapes. The developed system, based on the Flexible Action and Articulated Skeleton Toolkit (FAAST), controls in a remote and touchless mode the movements in the 3D environment in …
Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, 2012 SelectedWorks
Overcoming Limitations Of Signature Scanning -Applying Triz To Improve Anti-Virus Programs, Umakant Mishra
Umakant Mishra
A virus signature is a sequence of bytes that may be found in a virus program code but unlikely to be found elsewhere. Signature scanning is a method of detecting a virus by scanning a target program to detect the presence of any virus signature. If the signature is found then the target program is deemed infected, otherwise the target program is deemed uninfected.
Signature scanning is the most popular method of virus scanning and is adopted by all anti-virus programs. Signature scanning is capable of detecting more than 80% of viruses. It uses a simple logic and uses less …
Solving Virus Problems By Anti-Virus Developers- A Triz Perspective, 2012 SelectedWorks
Solving Virus Problems By Anti-Virus Developers- A Triz Perspective, Umakant Mishra
Umakant Mishra
The anti-virus developers play a very significant role in dealing with the computer viruses. They analyze the problems of different levels of users and find solutions for each of those problems. Their goal is not just to sell the product and make profit out of it. They undertake much greater responsibility to ensure that their product meets the expectations of the users and deals with the viruses efficiently.
Different levels of users dealing with computer face different types of problems. The developer must ensure that the product meets the needs of various levels of users and network administrators. The developer …
Detecting Macro Viruses - A Triz Based Analysis, 2012 SelectedWorks
Detecting Macro Viruses - A Triz Based Analysis, Umakant Mishra
Umakant Mishra
The macro viruses are easy to create but difficult to detect. Even for a virus scanner it is difficult to decide which macro is a virus and which macro is not, as a user macro may also create files, send emails and do all such activities that a macro virus can do. It is difficult to differentiate a genuine macro and a virus macro as both of them do similar type of jobs. Suspecting a macro to be virus just because it is “writing to a file” may result in false positives. It is necessary to improve the emulation method, …
Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, 2012 SelectedWorks
Improving Speed Of Virus Scanning- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra
Umakant Mishra
As the number of viruses increases the amount of time to scan for those viruses also increase. This situation is worsened because of the increasing number of files typically stored in a computer system. Besides more complex tests are required to detect the modern day’s intelligent viruses. Thus a combination of all these factors makes a full virus scan very lingering and resource consuming. With thousands of types of viruses and gigabytes of storages, a typical virus scanning may take several hours. Because of this reason many users don’t like to virus scan their computers unless so required.
This article …
Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, 2012 SelectedWorks
Detecting Boot Sector Viruses- Applying Triz To Improve Anti-Virus Programs, Umakant Mishra
Umakant Mishra
The boot sector virus infects the boot record of the hard disk or floppy disks. It gets loaded onto the memory every time the computer is booted and remains resident in the memory till the computer is shut down. Once entered it alters the boot sector of the hard disk and remains in the hard disk permanently until the system is totally damaged and fails to boot.
While analyzing the problem from TRIZ prospective we try different possibilities to avoid boot sector viruses, such as, Can we do away with boot record? Can we avoid booting from floppies? Can we …
Operating Software, 2012 SelectedWorks
Operating Software, Donovan Torgerson, Miyuru Arangala, Michael Hlas, David Bullock, Dayln Limesand, Cameron Kerbaugh, Daniel Schuler, Mitchell Fossen, Edwin Carlson, Atif Mohammad, Josh Berk, Jeremy Straub
Jeremy Straub
No abstract provided.
Cubesat Software Architecture, 2012 SelectedWorks
Cubesat Software Architecture, Christoffer Korvald, Atif Mohammad, Jeremy Straub, Josh Berk
Jeremy Straub
No abstract provided.
Openness, Intellectual Property And Standardization In The European Ict Sector, 2012 University of Leiden, The Netherlands
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
IP Theory
No abstract provided.
Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, 2012 University of North Florida
Empirical Performance Analysis Of High Performance Computing Benchmarks Across Variations In Cloud Computing, Sindhu Mani
UNF Graduate Theses and Dissertations
High Performance Computing (HPC) applications are data-intensive scientific software requiring significant CPU and data storage capabilities. Researchers have examined the performance of Amazon Elastic Compute Cloud (EC2) environment across several HPC benchmarks; however, an extensive HPC benchmark study and a comparison between Amazon EC2 and Windows Azure (Microsoft’s cloud computing platform), with metrics such as memory bandwidth, Input/Output (I/O) performance, and communication computational performance, are largely absent. The purpose of this study is to perform an exhaustive HPC benchmark comparison on EC2 and Windows Azure platforms.
We implement existing benchmarks to evaluate and analyze performance of two public clouds spanning …
Privacy Preserving Distributed Data Mining, 2012 University of Kentucky
Privacy Preserving Distributed Data Mining, Zhenmin Lin
Theses and Dissertations--Computer Science
Privacy preserving distributed data mining aims to design secure protocols which allow multiple parties to conduct collaborative data mining while protecting the data privacy. My research focuses on the design and implementation of privacy preserving two-party protocols based on homomorphic encryption. I present new results in this area, including new secure protocols for basic operations and two fundamental privacy preserving data mining protocols.
I propose a number of secure protocols for basic operations in the additive secret-sharing scheme based on homomorphic encryption. I derive a basic relationship between a secret number and its shares, with which we develop efficient secure …
Completeness For The Coalgebraic Cover Modality, 2012 University of Oxford
Completeness For The Coalgebraic Cover Modality, Clemens Kupke, Alexander Kurz, Yde Venema
Engineering Faculty Articles and Research
We study the finitary version of the coalgebraic logic introduced by L. Moss. The syntax of this logic, which is introduced uniformly with respect to a coalgebraic type functor, required to preserve weak pullbacks, extends that of classical propositional logic with a so-called coalgebraic cover modality depending on the type functor. Its semantics is defined in terms of a categorically defined relation lifting operation.
As the main contributions of our paper we introduce a derivation system, and prove that it provides a sound and complete axiomatization for the collection of coalgebraically valid inequalities. Our soundness and completeness proof is algebraic, …