Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Entire DC Network

Analysis And Visualization Of Flow Fields Using Information-Theoretic Techniques And Graph-Based Representations, Jun Ma Jan 2015

Analysis And Visualization Of Flow Fields Using Information-Theoretic Techniques And Graph-Based Representations, Jun Ma

Dissertations, Master's Theses and Master's Reports - Open

Three-dimensional flow visualization plays an essential role in many areas of science and engineering, such as aero- and hydro-dynamical systems which dominate various physical and natural phenomena. For popular methods such as the streamline visualization to be effective, they should capture the underlying flow features while facilitating user observation and understanding of the flow field in a clear manner.

My research mainly focuses on the analysis and visualization of flow fields using various techniques, e.g. information-theoretic techniques and graph-based representations. Since the streamline visualization is a popular technique in flow field visualization, how to select good streamlines to capture flow …


Access Control Programming Library And Exploration System, Zhitao Qiu Jan 2015

Access Control Programming Library And Exploration System, Zhitao Qiu

Dissertations, Master's Theses and Master's Reports - Open

The high complexity of advanced security models in the modern trusted systems requires an effective formal education for students. Education access control tools have been promoted. Though they can benefit the learning through analyzing or visualizing access control policies, few of them are designed to teach development of access control policies.

In this report, we propose an access control programming library which can provide students hand-on experience with the effect of an access control policy on a running program. A student can write a policy and then run programs under the policy. The Programming Library provides a system call wrapper …


Mower : A New Design For Non-Blocking Misprediction Recovery, Zhaoxiang Jin Jan 2015

Mower : A New Design For Non-Blocking Misprediction Recovery, Zhaoxiang Jin

Dissertations, Master's Theses and Master's Reports - Open

Mower is a micro-architecture technique which targets branch misprediction penalties in superscalar processors. It speeds-up the misprediction recovery process by dynamically evicting stale instructions and fixing the RAT (Register Alias Table) using explicit branch dependency tracking. Tracking branch dependencies is accomplished by using simple bit matrices. This low-overhead technique allows overlapping of the recovery process with instruction fetching, renaming and scheduling from the correct path. Our evaluation of the mechanism indicates that it yields performance very close to ideal recovery and provides up to 5% speed-up and 2% reduction in power consumption compared to a traditional recovery mechanism using a …


Generating Plans In Concurrent, Probabilistic, Over-Subscribed Domains, Li Li Jan 2015

Generating Plans In Concurrent, Probabilistic, Over-Subscribed Domains, Li Li

Dissertations, Master's Theses and Master's Reports - Open

Planning in realistic domains typically involves reasoning under uncertainty, operating under time and resource constraints, and finding the optimal subset of goals to work on. Creating optimal plans that consider all of these features is a computationally complex, challenging problem. This dissertation develops an AO* search based planner named CPOAO* (Concurrent, Probabilistic, Over-subscription AO*) which incorporates durative actions, time and resource constraints, concurrent execution, over-subscribed goals, and probabilistic actions. To handle concurrent actions, action combinations rather than individual actions are taken as plan steps. Plan optimization is explored by adding two novel aspects to plans. First, parallel steps that serve …


Object-Based Classification Of Earthquake Damage From High-Resolution Optical Imagery Using Machine Learning, James Bialas Jan 2015

Object-Based Classification Of Earthquake Damage From High-Resolution Optical Imagery Using Machine Learning, James Bialas

Dissertations, Master's Theses and Master's Reports - Open

Object-based approaches to the segmentation and supervised classification of remotely-sensed images yield more promising results compared to traditional pixel-based approaches. However, the development of an object-based approach presents challenges in terms of algorithm selection and parameter tuning. Subjective methods and trial and error are often used, but time consuming and yield less than optimal results. Objective methods are warranted, especially for rapid deployment in time sensitive applications such as earthquake induced damage assessment.

Our research takes a systematic approach to evaluating object-based image segmentation and machine learning algorithms for the classification of earthquake damage in remotely-sensed imagery using Trimble’s eCognition …


Weak Isometries Of Hamming Spaces, Ryan Walter Bruner Jan 2014

Weak Isometries Of Hamming Spaces, Ryan Walter Bruner

Dissertations, Master's Theses and Master's Reports - Open

In this thesis we study weak isometries of Hamming spaces. These are permutations of a Hamming space that preserve some but not necessarily all distances. We wish to find conditions under which a weak isometry is in fact an isometry. This type of problem was first posed by Beckman and Quarles for Rn. In chapter 2 we give definitions pertinent to our research. The 3rd chapter focuses on some known results in this area with special emphasis on papers by V. Krasin as well as S. De Winter and M. Korb who solved this problem for the Boolean …


Skin Lesion Extraction And Its Application, Yanliang Gu Jan 2014

Skin Lesion Extraction And Its Application, Yanliang Gu

Dissertations, Master's Theses and Master's Reports - Open

In this thesis, I study skin lesion detection and its applications to skin cancer diagnosis. A skin lesion detection algorithm is proposed. The proposed algorithm is based color information and threshold. For the proposed algorithm, several color spaces are studied and the detection results are compared. Experimental results show that YUV color space can achieve the best performance. Besides, I develop a distance histogram based threshold selection method and the method is proven to be better than other adaptive threshold selection methods for color detection. Besides the detection algorithms, I also investigate GPU speed-up techniques for skin lesion extraction and …


A Firewall Model Of File System Security, Lihui Hu Jan 2014

A Firewall Model Of File System Security, Lihui Hu

Dissertations, Master's Theses and Master's Reports - Open

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an …


Mining And Verification Of Temporal Events With Applications In Computer Micro-Architecture Research, Hui Meen Nyew Jan 2014

Mining And Verification Of Temporal Events With Applications In Computer Micro-Architecture Research, Hui Meen Nyew

Dissertations, Master's Theses and Master's Reports - Open

Computer simulation programs are essential tools for scientists and engineers to understand a particular system of interest. As expected, the complexity of the software increases with the depth of the model used. In addition to the exigent demands of software engineering, verification of simulation programs is especially challenging because the models represented are complex and ridden with unknowns that will be discovered by developers in an iterative process. To manage such complexity, advanced verification techniques for continually matching the intended model to the implemented model are necessary. Therefore, the main goal of this research work is to design a useful …


Automatic Labeling Of Rss Articles Using Online Latent Dirichlet Allocation, Zhe Lu Jan 2014

Automatic Labeling Of Rss Articles Using Online Latent Dirichlet Allocation, Zhe Lu

Dissertations, Master's Theses and Master's Reports - Open

The amount of information contained within the Internet has exploded in recent decades. As more and more news, blogs, and many other kinds of articles that are published on the Internet, categorization of articles and documents are increasingly desired. Among the approaches to categorize articles, labeling is one of the most common method; it provides a relatively intuitive and effective way to separate articles into different categories. However, manual labeling is limited by its efficiency, even thought the labels selected manually have relatively high quality. This report explores the topic modeling approach of Online Latent Dirichlet Allocation (Online-LDA). Additionally, a …


A Comparative Study And Evaluation Of Collaborative Recommendation Systems, Joshua C. Stomberg Jan 2014

A Comparative Study And Evaluation Of Collaborative Recommendation Systems, Joshua C. Stomberg

Dissertations, Master's Theses and Master's Reports - Open

Consumers currently enjoy a surplus of goods (books, videos, music, or other items) available to purchase. While this surplus often allows a consumer to find a product tailored to their preferences or needs, the volume of items available may require considerable time or effort on the part of the user to find the most relevant item. Recommendation systems have become a common part of many online business that supply users books, videos, music, or other items to consumers. These systems attempt to provide assistance to consumers in finding the items that fit their preferences. This report presents an overview of …


Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker Jan 2013

Conversion Of Domain Type Enforcement Language To The Java Security Manager, James Walker

Dissertations, Master's Theses and Master's Reports - Open

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access …


An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown Jan 2013

An Experience-Driven Pedagogy For The Instruction Of Software Testing In Computer Science, Christopher Duane Brown

Dissertations, Master's Theses and Master's Reports - Open

In the realm of computer programming, the experience of writing a program is used to reinforce concepts and evaluate ability. This research uses three case studies to evaluate the introduction of testing through Kolb's Experiential Learning Model (ELM). We then analyze the impact of those testing experiences to determine methods for improving future courses.

The first testing experience that students encounter are unit test reports in their early courses. This course demonstrates that automating and improving feedback can provide more ELM iterations. The JUnit Generation (JUG) tool also provided a positive experience for the instructor by reducing the overall workload. …


Understanding "Just Enough" Computer Users: Motivation Style And Proficiency, Harriet Cook King Jan 2012

Understanding "Just Enough" Computer Users: Motivation Style And Proficiency, Harriet Cook King

Dissertations, Master's Theses and Master's Reports - Open

Among daily computer users who are proficient, some are flexible at accomplishing unfamiliar tasks on their own and others have difficulty. Software designers and evaluators involved with Human Computer Interaction (HCI) should account for any group of proficient daily users that are shown to stumble over unfamiliar tasks. We define "Just Enough" (JE) users as proficient daily computer users with predominantly extrinsic motivation style who know just enough to get what they want or need from the computer. We hypothesize that JE users have difficulty with unfamiliar computer tasks and skill transfer, whereas intrinsically motivated daily users accomplish unfamiliar tasks …


Animated Transition In Similarity-Based Tiled Image Layout, Huan Zhang Jan 2012

Animated Transition In Similarity-Based Tiled Image Layout, Huan Zhang

Dissertations, Master's Theses and Master's Reports - Open

Effective techniques for organizing and visualizing large image collections are in growing demand as visual search gets increasingly popular. iMap is a treemap representation for visualizing and navigating image search and clustering results based on the evaluation of image similarity using both visual and textual information. iMap not only makes effective use of available display area to arrange images but also maintains stable update when images are inserted or removed during the query. A key challenge of using iMap lies in the difficult to follow and track the changes when updating the image arrangement as the query image changes.

For …


Poplar Gene Expression Data Analysis Pipelines, Xiang Li Jan 2012

Poplar Gene Expression Data Analysis Pipelines, Xiang Li

Dissertations, Master's Theses and Master's Reports - Open

Analyzing large-scale gene expression data is a labor-intensive and time-consuming process. To make data analysis easier, we developed a set of pipelines for rapid processing and analysis poplar gene expression data for knowledge discovery. Of all pipelines developed, differentially expressed genes (DEGs) pipeline is the one designed to identify biologically important genes that are differentially expressed in one of multiple time points for conditions. Pathway analysis pipeline was designed to identify the differentially expression metabolic pathways. Protein domain enrichment pipeline can identify the enriched protein domains present in the DEGs. Finally, Gene Ontology (GO) enrichment analysis pipeline was developed to …