Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2016

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 983

Full-Text Articles in Entire DC Network

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo Dec 2016

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo

Theses and Dissertations

A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.


Fast Fourier Transforms Over Prime Fields Of Large Characteristic And Their Implementation On Graphics Processing Units, Davood Mohajerani Dec 2016

Fast Fourier Transforms Over Prime Fields Of Large Characteristic And Their Implementation On Graphics Processing Units, Davood Mohajerani

Electronic Thesis and Dissertation Repository

Prime field arithmetic plays a central role in computer algebra and supports computation in Galois fields which are essential to coding theory and cryptography algorithms. The prime fields that are used in computer algebra systems, in particular in the implementation of modular methods, are often of small characteristic, that is, based on prime numbers that fit on a machine word. Increasing precision beyond the machine word size can be done via the Chinese Remaindering Theorem or Hensel Lemma. In this thesis, we consider prime fields of large characteristic, typically fitting on n machine words, where n is a power of …


Real-Time Online Chinese Character Recognition, Wenlong Zhang Dec 2016

Real-Time Online Chinese Character Recognition, Wenlong Zhang

Master's Projects

In this project, I built a web application for handwritten Chinese characters recognition in real time. This system determines a Chinese character while a user is drawing/writing it. The techniques and steps I use to build the recognition system include data preparation, preprocessing, features extraction, and classification. To increase the accuracy, two different types of neural networks ared used in the system: a multi-layer neural network and a convolutional neural network.


Cryptanalysis Of Homophonic Substitution Cipher Using Hidden Markov Models, Guannan Zhong Dec 2016

Cryptanalysis Of Homophonic Substitution Cipher Using Hidden Markov Models, Guannan Zhong

Master's Projects

We investigate the effectiveness of a Hidden Markov Model (HMM) with random restarts as a mean of breaking a homophonic substitution cipher. Based on extensive experiments, we find that such an HMM-based attack outperforms a previously de- veloped nested hill climb approach, particularly when the ciphertext message is short. We then consider a combination cipher, consisting of a homophonic substitution and a column transposition. We develop and analyze an attack on such a cipher. This attack employs an HMM (with random restarts), together with a hill climb to recover the column permutation. We show that this attack can succeed on …


Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …


Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio Dec 2016

Predicting User's Future Requests Using Frequent Patterns, Marc Nipuna Dominic Savio

Master's Projects

In this research, we predict User's Future Request using Data Mining Algorithm. Usage of the World Wide Web has resulted in a huge amount of data and handling of this data is getting hard day by day. All this data is stored as Web Logs and each web log is stored in a different format with different Field names like search string, URL with its corresponding timestamp, User ID’s that helps for session identification, Status code, etc. Whenever a user requests for a URL there is a delay in getting the page requested and sometimes the request is denied. Our …


Handling Relationships In A Wiki System, Yashi Kamboj Dec 2016

Handling Relationships In A Wiki System, Yashi Kamboj

Master's Projects

Wiki software enables users to manage content on the web, and create or edit web pages freely. Most wiki systems support the creation of hyperlinks on pages and have a simple text syntax for page formatting. A common, more advanced feature is to allow pages to be grouped together as categories. Currently, wiki systems support categorization of pages in a very traditional way by specifying whether a wiki page belongs to a category or not. Categorization represents unary relationship and is not sufficient to represent n-ary relationships, those involving links between multiple wiki pages.

In this project, we extend Yioop, …


Deep Data Analysis On The Web, Xuanyu Liu Dec 2016

Deep Data Analysis On The Web, Xuanyu Liu

Master's Projects

Search engines are well known to people all over the world. People prefer to use keywords searching to open websites or retrieve information rather than type typical URLs. Therefore, collecting finite sequences of keywords that represent important concepts within a set of authors is important, in other words, we need knowledge mining. We use a simplicial concept method to speed up concept mining. Previous CS 298 project has studied this approach under Dr. Lin. This method is very fast, for example, to mine the concept, FP-growth takes 876 seconds from a database with 1257 columns 65k rows, simplicial complex only …


Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held Dec 2016

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and …


A Machine Learning Approach To Determine Oyster Vessel Behavior, Devin Frey Dec 2016

A Machine Learning Approach To Determine Oyster Vessel Behavior, Devin Frey

University of New Orleans Theses and Dissertations

A support vector machine (SVM) classifier was designed to replace a previous classifier which predicted oyster vessel behavior in the public oyster grounds of Louisiana. The SVM classifier predicts vessel behavior (docked, poling, fishing, or traveling) based on each vessel’s speed and either net speed or movement angle. The data from these vessels was recorded by a Vessel Monitoring System (VMS), and stored in a PostgreSQL database. The SVM classifier was written in Python, using the scikit-learn library, and was trained by using predictions from the previous classifier. Several validation and parameter optimization techniques were used to improve the SVM …


Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang Dec 2016

Spatial Data Mining Analytical Environment For Large Scale Geospatial Data, Zhao Yang

University of New Orleans Theses and Dissertations

Nowadays, many applications are continuously generating large-scale geospatial data. Vehicle GPS tracking data, aerial surveillance drones, LiDAR (Light Detection and Ranging), world-wide spatial networks, and high resolution optical or Synthetic Aperture Radar imagery data all generate a huge amount of geospatial data. However, as data collection increases our ability to process this large-scale geospatial data in a flexible fashion is still limited. We propose a framework for processing and analyzing large-scale geospatial and environmental data using a “Big Data” infrastructure. Existing Big Data solutions do not include a specific mechanism to analyze large-scale geospatial data. In this work, we extend …


Web-Based Integrated Development Environment, Hien T. Vu Dec 2016

Web-Based Integrated Development Environment, Hien T. Vu

Master's Projects

As tablets become more powerful and more economical, students are attracted to them and are moving away from desktops and laptops. Their compact size and easy to use Graphical User Interface (GUI) reduce the learning and adoption barriers for new users. This also changes the environment in which undergraduate Computer Science students learn how to program. Popular Integrated Development Environments (IDE) such as Eclipse and NetBeans require disk space for local installations as well as an external compiler. These requirements cannot be met by current tablets and thus drive the need for a web-based IDE. There are also many other …


Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi Dec 2016

Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi

Electronic Thesis and Dissertation Repository

Large-scale contractual systems engineering projects often need to comply with a myriad of government regulations and standards as part of contractual fulfillment. A key activity in the requirements engineering (RE) process for such a project is to elicit appropriate requirements from the regulations and standards that apply to the target system. However, there are impediments in achieving compliance due to such factors as: the voluminous contract and its high-level specifications, large number of regulatory documents, and multiple domains of the system. Little empirical research has been conducted on developing a shared understanding of the compliance-oriented complexities involved in such projects, …


The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti Dec 2016

The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti

Master of Science in Information Technology Theses

Social media plays an essential role in the modern society, enabling people to be better connected to each other and creating new opportunities for businesses. At the same time, social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate security risks. Users are an integral part of any security mix. In this thesis, we explore the relationship between users’ security perceptions and their actual behavior on social networking sites. Protection motivation theory (PMT), initially …


Bgsu Minecraft Initiative Website, Jacob Gusching Dec 2016

Bgsu Minecraft Initiative Website, Jacob Gusching

Honors Projects

A website for the BGSU Minecraft Initiative, a program that uses Minecraft as an educational tool to engage younger students to learn. This website is a communication tool to showcase the work of BGSU students and to spread the knowledge and lesson to plans to interested parties.


Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly Dec 2016

Algorithm For Premature Ventricular Contraction Detection From A Subcutaneous Electrocardiogram Signal, Iris Lynn Shelly

Dissertations and Theses

Cardiac arrhythmias occur when the normal pattern of electrical signals in the heart breaks down. A premature ventricular contraction (PVC) is a common type of arrhythmia that occurs when a heartbeat originates from an ectopic focus within the ventricles rather than from the sinus node in the right atrium. This and other arrhythmias are often diagnosed with the help of an electrocardiogram, or ECG, which records the electrical activity of the heart using electrodes placed on the skin. In an ECG signal, a PVC is characterized by both timing and morphological differences from a normal sinus beat.

An implantable cardiac …


Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant Dec 2016

Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant

Honors Projects

Students’ use of the Canvas learning management system (LMS) as implemented by Bowling Green State University (BGSU) is a substantial part of their learning experience. A well designed and easy to use LMS not only allows students to be more efficient, it allows students to engage effectively with their coursework. Students’ ability to effectively use the LMS is examined to understand whether the system is usable, and if not, what changes should be made. Research included two distinct elements. First, students were asked to complete nine tasks identified as common tasks within Canvas, while being timed. Additionally, students responded to …


Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar Dec 2016

Improving The Prediction Accuracy Of Text Data And Attribute Data Mining With Data Preprocessing, Priyanga Chandrasekar

Master of Science in Computer Science Theses

Data Mining is the extraction of valuable information from the patterns of data and turning it into useful knowledge. Data preprocessing is an important step in the data mining process. The quality of the data affects the result and accuracy of the data mining results. Hence, Data preprocessing becomes one of the critical steps in a data mining process.

In the research of text mining, document classification is a growing field. Even though we have many existing classifying approaches, Naïve Bayes Classifier is good at classification because of its simplicity and effectiveness. The aim of this paper is to identify …


Color Separation For Background Subtraction, Jiaqi Zhou Dec 2016

Color Separation For Background Subtraction, Jiaqi Zhou

Electronic Thesis and Dissertation Repository

Background subtraction is a vital step in many computer vision systems. In background subtraction, one is given two (or more) frames of a video sequence taken with a still camera. Due to the stationarity of the camera, any color change in the scene is mainly due to the presence of moving objects. The goal of background subtraction is to separate the moving objects (also called the foreground) from the stationary background. Many background subtraction approaches have been proposed over the years. They are usually composed of two distinct stages, background modeling and foreground detection.

Most of the standard background subtraction …


Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard Dec 2016

Substituting Failure Avoidance For Redundancy In Storage Fault Tolerance, Christopher David Brumgard

Doctoral Dissertations

The primary mechanism for overcoming faults in modern storage systems is to introduce redundancy in the form of replication and error correcting codes. The costs of such redundancy in hardware, system availability and overall complexity can be substantial, depending on the number and pattern of faults that are handled. This dissertation describes and analyzes, via simulation, a system that seeks to use disk failure avoidance to reduce the need for costly redundancy by using adaptive heuristics that anticipate such failures. While a number of predictive factors can be used, this research focuses on the three leading candidates of SMART errors, …


Expectation-Centered Analytics For Instructors And Students, Suzanne L. Dazo Dec 2016

Expectation-Centered Analytics For Instructors And Students, Suzanne L. Dazo

Student Work

Learning analytics is the measurement, collection, analysis, and reporting of data about learners and their contexts. An outcome and primary goal of learning analytics should be to inform instructors, who are primary stakeholders, so that they can make effective decisions in their courses. To support instructor inquiry, I apply theory on reflective practice to learning analytic development. Articulating an instructor's pedagogical expectations is one way to begin facilitating a reflective practice. Expectations based on instructor goals serve as a natural next step and the springboard from which data can be collected. I hypothesize that a learning analytic that encodes and …


Myth Or Reality? Crowdsourcing As A Complex Problemsolving Model: Evidence From Software Developed By The Crowd And Professionals, Abhishek Tripathi Dec 2016

Myth Or Reality? Crowdsourcing As A Complex Problemsolving Model: Evidence From Software Developed By The Crowd And Professionals, Abhishek Tripathi

Student Work

Crowdsourcing is a problem-solving model. Conventional theory suggests that solving complex problems is a province of professionals, people with sufficient knowledge about the domain. Prior literature indicated that the crowd is also a great source for solving complex problems. However, there is a lack of experimental research to support that crowdsourcing is a useful model for complex problem-solving (CPS), especially in the software development context. The broad goal of this dissertation is to address this research gap and improve understanding of crowdsourcing as a viable and effective CPS model. This research proposed and tested a research model of perceived quality …


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell Dec 2016

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a Java software …


Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan Dec 2016

Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan

Computer Science and Software Engineering

The goal of this senior project centered around improving the quality of student and teacher experiences when visiting the library. The task of finding a book amongst the shelves is an arduous one, which I felt could be improved upon through implementation and testing of a Book Lookup system for the Cal Poly Robert E. Kennedy Library. Development for this project was done using a Python framework. Testing and earlier designs were also created using JavaScript and PHP. Repeated tests were conducted on the accuracy of the software and its ability to decrease user search-time when compared to conventional methods.


Review Classification, Balraj Aujla Dec 2016

Review Classification, Balraj Aujla

Computer Science and Software Engineering

The goal of this project is to find a way to analyze reviews and determine the sentiment of a review. It uses various machine learning techniques in order to achieve its goals such as SVMs and Naive Bayes. Overall the purpose is to learn many different machine learning techniques, determine which ones would be useful for the project, then compare the results. Research is the foremost goal of the project, and it is able to determine the better algorithm for review classification, naive bayes or an SVM. In addition, an SVM which actually gave review’s scores rather than just classifying …


Ios Application For Inventory In Small Retail Stores, Andrea Savage Dec 2016

Ios Application For Inventory In Small Retail Stores, Andrea Savage

Computer Science and Software Engineering

Currently, small retail stores with low technology budgets such as those right here in San Luis Obispo are struggling to integrate new technologies into their companies. This mobile application built for iOS with a Firebase backend is seeking to remove their barriers to entry. I built this application to give small retail stores a customizable application that allows them to display products electronically to customers and maintain accurate inventory both in one place. The construction of this application hinged around three major design decisions: UI design of the color management views, organization of the database, and accessing the database with …


Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook Dec 2016

Microstructural Analysis Of Thermoelastic Response, Nonlinear Creep, And Pervasive Cracking In Heterogeneous Materials, Alden C. Cook

Electronic Theses and Dissertations

This dissertation is concerned with the development of robust numerical solution procedures for the generalized micromechanical analysis of linear and nonlinear constitutive behavior in heterogeneous materials. Although the methods developed are applicable in many engineering, geological, and materials science fields, three main areas are explored in this work. First, a numerical methodology is presented for the thermomechanical analysis of heterogeneous materials with a special focus on real polycrystalline microstructures obtained using electron backscatter diffraction techniques. Asymptotic expansion homogenization and finite element analysis are employed for micromechanical analysis of polycrystalline materials. Effective thermoelastic properties of polycrystalline materials are determined and compared …


Ransomware In High-Risk Environments, Shallaw M. Aziz Dec 2016

Ransomware In High-Risk Environments, Shallaw M. Aziz

Information Technology Capstone Research Project Reports

In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms …


The Utility Of Mobile Phones For Health Among Women Living With Hiv In Urban Malawi, Linda Marie Dietrich Dec 2016

The Utility Of Mobile Phones For Health Among Women Living With Hiv In Urban Malawi, Linda Marie Dietrich

Theses and Dissertations

The use of mobile phones are becoming ubiquitous with growing interest by healthcare providers to utilize mobile phone technology for various health-related applications, called mHealth. This is especially true in low-income countries such as those in sub-Saharan Africa. When implementing mHealth applications, it is important to understand the dynamic social, cultural and environmental factors where mHealth will be implemented to ensure that interventions developed are effective. A qualitative study to explore the sociotechnical factors experienced by women participating in an HIV support group in urban Malawi was conducted to enhance our understanding of women’s experience with mobile phone use and …


Analizimi Dhe Zhvillimi I Modulit Të Orarit Në Wordpress, Gëzim Rexhepi Dec 2016

Analizimi Dhe Zhvillimi I Modulit Të Orarit Në Wordpress, Gëzim Rexhepi

Theses and Dissertations

Përdorimi i një orari do të ishte një lehtësim i madh në menaxhimin e ngjarjeve të cilat ndodhin në një festival, si rezultat i kërkesave dhe nevojave për një orar i cili do të ishte lehtë i menaxhueshëm nga festivalet e ndryshme vendosa të zhvilloj ketë orar. Ky orar është dizajnuar dhe implementuar për festivalin “Dokufest”. Mirëpo ky orar mund të përdoret edhe nga festivale të tjera. Ky orar do ju ndihmoj festivaleve të ndryshme që të kenë më të lehtë shtimin e ngjarjeve të ndryshme e pastaj ato ngjarje ti shfaqin në këtë orar i cili është mjaft i …