Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri Aug 2008

On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri

Theses and Dissertations

A graph is a key construct for expressing relationships among objects, such as the radio connectivity between nodes contained in an unmanned vehicle swarm. The study of such networks may include ranking nodes based on importance, for example, by applying the PageRank algorithm used in some search engines to order their query responses. The PageRank values correspond to a unique eigenvector typically computed by applying the power method, an iterative technique based on matrix multiplication. The first new result described herein is a lower bound on the execution time of the PageRank algorithm that is derived by applying standard assumptions …


Algorithms For Some Geometric Facility Location And Path Planning Problems., Sasanka Roy Dr. Jun 2008

Algorithms For Some Geometric Facility Location And Path Planning Problems., Sasanka Roy Dr.

Doctoral Theses

The facility location problem is a resource allocation problem that mainly deals with adequate placement of various types of facilities to serve a distributed set of demands satisfying the nature of interactions between the demands and facilities and optimizing the cost of placing/maintaining the facilities and the quality of services.The facility location problem is well-studied in the Operations Research literature and recently has received a lot of attention in the Computer Science community. For a company, the facility location problem provides more strategic decisions than just giving importance to locate the lowest cost space for storing its products. While identifying …


Algorithms For White-Box Obfuscation Using Randomized Subcircuit Selection And Replacement, Kenneth E. Norman Mar 2008

Algorithms For White-Box Obfuscation Using Randomized Subcircuit Selection And Replacement, Kenneth E. Norman

Theses and Dissertations

Software protection remains an active research area with the goal of preventing adversarial software exploitation such as reverse engineering, tampering, and piracy. Heuristic obfuscation techniques lack strong theoretical underpinnings while current theoretical research highlights the impossibility of creating general, efficient, and information theoretically secure obfuscators. In this research, we consider a bridge between these two worlds by examining obfuscators based on the Random Program Model (RPM). Such a model envisions the use of program encryption techniques which change the black-box (semantic) and white-box (structural) representations of underlying programs. In this thesis we explore the possibilities for white-box transformation. Under an …


Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith Mar 2008

Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith

Theses and Dissertations

The purpose of this thesis is to mathematically remove the shadow of an individual on video. The removal of the shadow will aid in the rendering of higher quality binary silhouettes than previously allowed. These silhouettes will allow researchers studying gait recognition to work with silhouettes unhindered by unrelated data. The thesis begins with the analysis of videos of solid colored backgrounds. A formulation of the effect of shadow on specified colors will aid in the derivation of a hypothesis test to remove an individual’s shadow. Video of an individual walking normally, perpendicular to the camera will be utilized to …


Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley Mar 2008

Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley

Theses and Dissertations

There is a need to expedite the process of designing military hardware to stay ahead of the adversary. The core of this project was to build reusable, synthesizeable libraries to make this a possibility. In order to build these libraries, Matlab® commands and functions, such as Conv2, Round, Floor, Pinv, etc., had to be converted into reusable VHDL modules. These modules make up reusable libraries for the Mission Specific Process (MSP) which will support AFRL/RY. The MSP allows the VLSI design process to be completed in a mere matter of days or months using an FPGA or ASIC design, as …


Geometric Primitives In Digital Images: Analyses And Applications Using Digital Geometry., Partha Bhowmick Dr. Feb 2008

Geometric Primitives In Digital Images: Analyses And Applications Using Digital Geometry., Partha Bhowmick Dr.

Doctoral Theses

No abstract provided.


Chemical Analysis Of Polymer Blends Via Synchrotron X-Ray Tomography, Heath Alan Barnett Jan 2008

Chemical Analysis Of Polymer Blends Via Synchrotron X-Ray Tomography, Heath Alan Barnett

LSU Doctoral Dissertations

Material properties of industrial polymer blends are of great importance. X-ray tomography has been used to obtain spatial chemical information about various polymer blends. The spatial images are acquired with synchrotron X-ray tomography because of its rapidity, good spatial resolution, large field-of-view, and elemental sensitivity. The spatial absorption data acquired from X-ray tomography experiments is converted to spatial chemical information via a linear least squares fit of multi-spectral X-ray absorption data. A fiberglass-reinforced polymer blend with a new-generation flame retardant is studied with multi-energy synchrotron X-ray tomography to assess the blend homogeneity. Relative to other composite materials, this sample is …