Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Other Computer Sciences

PDF

2011

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 68

Full-Text Articles in Entire DC Network

Android Memory Capture And Applications For Security And Privacy, Joseph T. Sylve Dec 2011

Android Memory Capture And Applications For Security And Privacy, Joseph T. Sylve

University of New Orleans Theses and Dissertations

The Android operating system is quickly becoming the most popular platform for mobiledevices. As Android’s use increases, so does the need for both forensic and privacy toolsdesigned for the platform. This thesis presents the first methodology and toolset for acquiringfull physical memory images from Android devices, a proposed methodology for forensicallysecuring both volatile and non-volatile storage, and details of a vulnerability discovered by theauthor that allows the bypass of the Android security model and enables applications to acquirearbitrary permissions.


Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra Dec 2011

The Dirty Tricks Played By Web Hosting Agencies, Umakant Mishra

Umakant Mishra

The number of websites are increasing in exponential rate. There are almost 50,000 websites being launched in every week and a similar number of web hosting companies are thriving to grab that opportunity. This has led to a cutthroat competition between the web hosting companies. The competition has gone beyond the ethical boundaries and many of them follow various unfair practices to attract and retain customers.


Automated Pollen Image Classification, Nicholas Quentin Haas Dec 2011

Automated Pollen Image Classification, Nicholas Quentin Haas

Masters Theses

This Master of Science thesis reviews previous research, proposes a method anddemonstrates proof-of-concept software for the automated matching of pollen grainimages to satisfy degree requirements at the University of Tennessee. An ideal imagesegmentation algorithm and shape representation data structure is selected, alongwith a multi-phase shape matching system. The system is shown to be invariantto synthetic image translation, rotation, and to a lesser extent global contrast andintensity changes. The proof-of-concept software is used to demonstrate how pollengrains can be matched to images of other pollen grains, stored in a database, thatshare similar features with up to a 75% accuracy rate.


Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong Nov 2011

Investigating The Role Of The Internet In Women And Minority Stem Participation: A Case Study Of Two Florida Engineering Programs, Arland Nguema Ndong

USF Tampa Graduate Theses and Dissertations

Despite our awareness of the fascination modern humans have with the Internet, little is known about how and why colleges and universities create and maintain Websites. At the most general level, in this case study, I hypothesize that university Websites serve as communication and marketing tools in attracting students. At the most specific level, I postulate that civil engineering programs with Web pages depicting images of women and minorities would be more successful in recruiting and retaining women and students of color than civil engineering programs with Web pages displaying fewer or no images of women and minorities. The primary …


Improving Search Engine Results By Query Extension And Categorization, Guo Mei Sep 2011

Improving Search Engine Results By Query Extension And Categorization, Guo Mei

Electronic Thesis and Dissertation Repository

Since its emergence, the Internet has changed the way in which information is distributed and it has strongly influenced how people communicate. Nowadays, Web search engines are widely used to locate information on the Web, and online social networks have become pervasive platforms of communication.

Retrieving relevant Web pages in response to a query is not an easy task for Web search engines due to the enormous corpus of data that the Web stores and the inherent ambiguity of search queries. We present two approaches to improve the effectiveness of Web search engines. The first approach allows us to retrieve …


Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb Aug 2011

Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb

Electronic Thesis and Dissertation Repository

Workflow-nets are mathematical frameworks that are used to formally describe, model and implement workflows. First, we propose critical section workflow nets (abbreviated WFCSnet). This framework allows feedbacks in workflow systems while ensuring the soundness of the workflow. Feedback is generally not recommended in workflow systems as they threaten the soundness of the system. The proposed WFCSnet allows safe feedback and limits the maximum number of activities per workflow as required. A theorem for soundness of WFCSnet is presented. Serializability, Separability, Quasi-liveness and CS-Properties of WFCSnet are examined and some theorems and lemmas are proposed to mathematically formalize them. In this …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


Social Network Leverage Search, Payal Gupta Jul 2011

Social Network Leverage Search, Payal Gupta

Master's Projects

Social networks are at an all time high, nowadays. They make the world a smaller place to live in. People can stay in touch with friends and can make new friends on these social networks which traditionally were not possible without internet service. The possibilities provided by social networks enable vast and immediate contact. People tend to spend lot of time on the social networks like Facebook, LinkedIn and Twitter peeping into their friend‟s accounts and trying to stay connected with the world.
However, recently people have started closing their accounts on these famous social networks after having been irritated …


Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel Jul 2011

Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel

Computer Science Faculty Publications

Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him or herself. Its effectiveness in rehabilitation and education has been repeatedly demonstrated but technical challenges remain in creating video contents that depict previously unseen behaviors. In this paper, we propose a novel system that re-renders new talking-head sequences suitable to be used for VSM treatment of patients with voice disorder. After the raw footage is captured, a new speech track is either synthesized using text-to-speech or selected based on voice similarity from a database of clean speeches. …


A Theoretical Model Of Multi-Agent Quantum Computing, F. Matthew Mihelic Jun 2011

A Theoretical Model Of Multi-Agent Quantum Computing, F. Matthew Mihelic

Faculty Publications

The best design for practical quantum computing is one that emulates the multi-agent quantum logic function of natural biological systems. Such systems are theorized to be based upon a quantum gate formed by a nucleic acid Szilard engine (NASE) that converts Shannon entropy of encountered molecules into useful work of nucleic acid geometric reconfiguration. This theoretical mechanism is logically and thermodynamically reversible in this special case because it is literally constructed out of the (nucleic acid) information necessary for its function, thereby allowing the nucleic acid Szilard engine to function reversibly because, since the information by which it functions exists …


Onboard Video Stabilization For Unmanned Air Vehicles, Nicholas Stewart Cross Jun 2011

Onboard Video Stabilization For Unmanned Air Vehicles, Nicholas Stewart Cross

Master's Theses

Unmanned Air Vehicles (UAVs) enable the observation of hazardous areas without endangering a pilot. Observational capabilities are provided by on-board video cameras and images are relayed to remote operators for analysis. However, vibration and wind cause video camera mounts to move and can introduce unintended motion that makes video analysis more difficult. Video stabilization is a process that attempts to remove unwanted movement from a video input to provide a clearer picture.

This thesis presents an onboard video stabilization solution that removes high-frequency jitter, displays output at 20 frames per second (FPS), and runs on a Blackfin embedded processor. Any …


Symbolic Quantum Circuit Simplification In Sympy, Matthew Curry Jun 2011

Symbolic Quantum Circuit Simplification In Sympy, Matthew Curry

Physics

In the field of quantum information science, one can design a series of quantum logic operations known as a circuit. Circuits are the basis for quantum computations in quantum computing. As circuits will most likely be designed from a logical standpoint, there could exist mathematical redundancies which will lead to a larger circuit than necessary. These redundancies are computationally expensive, and there is a need for them to be found and eliminated to simplify the circuit. We present our research on finding the rules for simplifying circuits and its implementation in SymPy.


Disability And The Web: Why Website Accessibility Matters, Vivienne Conway May 2011

Disability And The Web: Why Website Accessibility Matters, Vivienne Conway

InfoSci@ECU Seminars

With Australia now transitioning to WCAG 2.0, accessibility has become a critical area requiring a far greater emphasis in the next couple of years. The Australian Human Rights Commission has argued that all Australian websites should meet WCAG 2.0 AA by December 2014. In this presentation, Vivienne will discuss important findings from her study of public library web site accessibility. She will also provide insights into her current PhD investigation and give a first hand account of the Hyderabad conference and global efforts on web site accessibility.


Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb May 2011

Roundtable On Australian National Data Service, Mathew Wyatt, Julia Gross, Toby Burrows, Salim Taleb

InfoSci@ECU Seminars

The Australian National Data Service (ANDS) (http://ands.org.au/index.html) provides funding to foster partnerships and build infrastructure to enable better local data management in Australian universities and research institutions. Begun in 2008, ANDS has received $72 million of Commonwealth funding. ANDS aims to establish infrastructure and services for an Australian research data commons in which research data with enduring value and the potential for reuse, is preserved and managed for continuing accessibility.


An Introductory Educational Board Game For Use In Early Computer Science Education, Tyler Moore May 2011

An Introductory Educational Board Game For Use In Early Computer Science Education, Tyler Moore

Computer Science and Computer Engineering Undergraduate Honors Theses

Early computer science education should be necessary in high school curricula, but often it becomes inextricably linked to the act of programming instead of the study of the principles of computation. In order to divest computer science from programming a new teaching medium is needed, and early research into games as teaching tools shows some positive results when used properly. In order to find a better way to teach early computer science concepts I have designed and implemented a board game which illustrates and defines a few necessary computer science terms and mechanics. I had reasonable success in the classroom, …


Determining The Effects Of Technology On Children, Kristina E. Hatch May 2011

Determining The Effects Of Technology On Children, Kristina E. Hatch

Senior Honors Projects

Determining the Effects of Technology on Children

Kristina Hatch

Faculty Sponser: Timothy Henry, Computer Science and Statistics

Technology has become an essential part of Americans’ daily lives, affecting our communications, mail, relationships, the management of our bills and finances. As we have become more immersed in the benefits and capabilities of these constantly developing technologies, children as well as adults have become avid users. Laptops and cell phones are specially developed for preteens. Software and game companies have been targeting children in their game development. Video games have become common entertainment for children as young as four. Children today can …


A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith Apr 2011

A Cost-Benefit Analysis Of A Campus Computing Grid, Preston M. Smith

Purdue Polytechnic Masters Theses

Any major research institution has a substantial number of computer systems on its campus, often in the scale of tens of thousands. Given that a large amount of scientific computing is appropriate for execution in an opportunistic environment, a campus grid is an inexpensive way to build a powerful computational resource. What is missing, though, is a model for making an informed decision on the cost-effectives of a campus grid. In this thesis, the author describes a model for measuring the costs and benefits of building a campus computing resource based on the institution’s existing investment in computing hardware.

For …


Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar Apr 2011

Substitution Cipher With Non­Prefix Codes, Rashmi Bangalore Muralidhar

Master's Projects

Substitution ciphers normally use prefix free codes ­ there is no code word which is the prefix of some other code word. Prefix free codes are used for encryption because it makes the decryption process easier at the receiver's end.
In this project, we study the feasibility of substitution ciphers with non­prefix codes. The advantage of using non­prefix codes is that extracting statistical information is more difficult. However, the ciphertext is nontrivial to decrypt.
We present a dynamic programming technique for decryption and verify that the plaintext can be recovered. This shows that substitution ciphers with non­prefix codes are feasible. …


Decompiler For Pseudo Code Generation, Ankit Patel Apr 2011

Decompiler For Pseudo Code Generation, Ankit Patel

Master's Projects

Decompiling is an area of interest for researchers in the field of software reverse engineering. When the source code from a high-level programming language is compiled, it loses a great deal of information, including code structure, syntax, and punctuation.
The purpose of this research is to develop an algorithm that can efficiently decompile assembly language into pseudo C code. There are tools available that claim to extract high-level code from an executable file, but the results of these tools tend to be inaccurate and unreadable.
Our proposed algorithm can decompile assembly code to recover many basic high-level programming structures, including …


Rna Secondary Structure Prediction Tool, Meenakshee Mali Apr 2011

Rna Secondary Structure Prediction Tool, Meenakshee Mali

Master's Projects

Ribonucleic Acid (RNA) is one of the major macromolecules essential to all forms of life. Apart from the important role played in protein synthesis, it performs several important functions such as gene regulation, catalyst of biochemical reactions and modification of other RNAs. In some viruses, instead of DNA, RNA serves as the carrier of genetic information. RNA is an interesting subject of research in the scientific community. It has lead to important biological discoveries. One of the major problems researchers are trying to solve is the RNA structure prediction problem. It has been found that the structure of RNA is …


Robust Watermarking Using Hidden Markov Models, Mausami Mungale Apr 2011

Robust Watermarking Using Hidden Markov Models, Mausami Mungale

Master's Projects

Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars. Prevention is a difficult problem since digital documents are easy to copy and distribute. Watermarking is a possible defense against software piracy. A software watermark consists of information embedded in the software, which allows it to be identified. A watermark can act as a deterrent to unauthorized copying, since it can be used to provide evidence for legal action against those responsible for piracy.
In this project, we present a novel software watermarking scheme that …


Automated Penetration Testing, Neha Samant Apr 2011

Automated Penetration Testing, Neha Samant

Master's Projects

Penetration testing is used to search for vulnerabilities that might exist in a system. The testing usually involves simulating different types of attacks on the target system. This type of testing provides an organized and controlled way to identify security shortcomings. The resources and time required for comprehensive testing can make penetration testing cost intensive. Consequently, such tests are usually only performed during important milestones.
In this project we have automated the penetration testing process for several protocol-based attacks. Our automated penetration testing application covers several attacks based on HTTP, SIP and TCP/IP. The objective of this work is to …


Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik Apr 2011

Online And Offline Ebook Management System Using W-Cms, Rohan Vibhandik

Master's Projects

In this internet and smart-phone era paper books are almost obsolete. Many developers have come up with the eBooks which can be read online on computer or on a smart-phone. Users can now access them offline any time without carrying a bulky pBook (Paper Book). The stable eBook application should restrict and control the use of contents to protect the copyrights. Encryption and enforcement of digital policies are generally managed by Digital Rights Management (DRM). The stable system for online as well as offline readers safeguard the intellectual properties for authors, publishers by providing a protection to their digital content, …


Fbchatters: A Facebook Application For Gtalk, Ronak Shah Apr 2011

Fbchatters: A Facebook Application For Gtalk, Ronak Shah

Master's Projects

The motto of this project is to provide accessibility to Google talk (gtalk) service within a Facebook account by creating Facebook application called FBchatters and also by creating Firefox plug-in called FBchatters. Most of all internet users have account on Facebook and Google. Social network site, Facebook has more than 600 million users and half of them log on to Facebook in any given day [1]. Google also has 170 million users who are using gmail and gtalk services every day. There are lot of users who do chatting simultaneously on Facebook and Gtalk. Also, Google talk provides a facility …


Video Chat Application For Facebook, Shirali Chokshi Apr 2011

Video Chat Application For Facebook, Shirali Chokshi

Master's Projects

This project is mainly written for the facebook users. In today’s world, there are many social networking sites available. Among those social networking web sites, facebook is widely used web site. Like all other social networking web sites, Facebook also provides many features to attract more and more users. But it lacks in providing the most important feature of social networking, i.e. video chat. I explore the different options and requirements needed to build the video chat application. I have also described the integration of the application with the facebook.


Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski Apr 2011

Ab Initio Protein Structure Prediction Algorithms, Maciej Kicinski

Master's Projects

Genes that encode novel proteins are constantly being discovered and added to databases, but the speed with which their structures are being determined is not keeping up with this rate of discovery. Currently, homology and threading methods perform the best for protein structure prediction, but they are not appropriate to use for all proteins. Still, the best way to determine a protein's structure is through biological experimentation. This research looks into possible methods and relations that pertain to ab initio protein structure prediction. The study includes the use of positional and transitional probabilities of amino acids obtained from a non-redundant …


Similarity Tests For Metamorphic Virus Detection, Mahim Patel Apr 2011

Similarity Tests For Metamorphic Virus Detection, Mahim Patel

Master's Projects

A metamorphic computer virus generates copies of itself using code morphing techniques. A new virus has the same functionality as the parent but it has a different internal structure. The goal of the metamorphic virus writer is to produce viral copies that have no common signature. If the viral copies are sufficiently different, they can evade signature detection, which is the most widely-used anti-virus technique.
In previous research, hidden Markov models (HMMs) have been used to detect some metamorphic viruses. However, recent research has shown that it is possible for carefully designed metamorphic viruses to evade HMM-based detection.
In this …


User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev Apr 2011

User Monitor & Feedback Mechanism For Social Scientific Study On Laptop Energy Reduction, Namrata Buddhadev

Master's Projects

The dawn of the laptop era presents new challenges to the computing research community. Performance is no longer the end all be all of computing research because a new, significant requirement has cropped up: reducing the power consumption and improving battery usage. The key restriction to mobility is the constant need to be near a power outlet to recharge the laptop battery. Thus, extending battery life without compromising performance is a pressing concern.
A research named as "iGreen" was proposed to stimulate power consumption awareness and behavioral change among laptop users via interactive energy-usage feedback with college students as the …