Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Entire DC Network

Data Stream Algorithms For Large Graphs And High Dimensional Data, Hoa Vu Oct 2018

Data Stream Algorithms For Large Graphs And High Dimensional Data, Hoa Vu

Doctoral Dissertations

In contrast to the traditional random access memory computational model where the entire input is available in the working memory, the data stream model only provides sequential access to the input. The data stream model is a natural framework to handle large and dynamic data. In this model, we focus on designing algorithms that use sublinear memory and a small number of passes over the stream. Other desirable properties include fast update time, query time, and post processing time. In this dissertation, we consider different problems in graph theory, combinatorial optimization, and high dimensional data processing. The first part of …


Algorithms For Exploratory Queries Over Web Database, Md Farhadur Rahman Aug 2018

Algorithms For Exploratory Queries Over Web Database, Md Farhadur Rahman

Computer Science and Engineering Dissertations

In recent years we have seen an increase in the popularity of many web applications. The functionality of these applications range from allowing users to interact using online social network, to assist users in their everyday activity such as selecting a hotel in an area, locating a nearby restaurant etc. Google Maps, WeChat, FourSquare, AirBnB, TripAdvisor, and Hotels.com are a few such examples. The backed database of these applications can be a rich source of information for the corresponding application domain. For example, using Google Maps a user can find the ratings, reviews, and price of a restaurant, using Zillow …


Improving Time And Space Efficiency Of Trie Data Structure, Nirmik Milind Kale Aug 2018

Improving Time And Space Efficiency Of Trie Data Structure, Nirmik Milind Kale

Computer Science and Engineering Theses

Trie or prefix tree is a data structure that has been used widely in some applications such as prefix-matching, auto-complete suggestions, and IP routing tables for a long time. What makes tries even more interesting is that its time complexity is dependent on the length of the keys inserted or searched in the trie, instead of on the total number of keys in the data structure. Tries are also strong contenders to consider against hash tables in various applications due to two reasons - their almost deterministic time complexity based on average key length, especially when using large number of …


Offensive And Defensive Security For Everyday Computer Systems, Ian Markwood Jun 2018

Offensive And Defensive Security For Everyday Computer Systems, Ian Markwood

USF Tampa Graduate Theses and Dissertations

This dissertation treats a variety of topics in the computer security domain which have direct impact on everyday life. The first extends false data injection attacks against state estimation in electric power grids and then provides a novel power flow model camouflage method to hamper these attacks. The second deals with automotive theft response, detailing a method for a car to intelligently identify when it has been stolen, based on collected behavioral traits of its driver. The third demonstrates a new attack against the content integrity of the PDF file format, caus- ing humans and computers to see different information …


Iterated Local Search Algorithms For Bike Route Generation, Aidan Pieper Jun 2018

Iterated Local Search Algorithms For Bike Route Generation, Aidan Pieper

Honors Theses

Planning routes for recreational cyclists is challenging because they prefer longer more scenic routes, not the shortest one. This problem can be modeled as an instance of the Arc Orienteering Problem (AOP), a known NP-Hard optimization problem. Because no known algorithms exist to solve this optimization problem efficiently, we solve the AOP using heuristic algorithms which trade accuracy for speed. We implement and evaluate two different Iterated Local Search (ILS) heuristic algorithms using an open source routing engine called GraphHopper and the OpenStreetMap data set. We propose ILS variants which our experimental results show can produce better routes at the …


Geometric Algorithms For Intervals And Related Problems, Shimin Li May 2018

Geometric Algorithms For Intervals And Related Problems, Shimin Li

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

In this dissertation, we study several problems related to intervals and develop efficient algorithms for them. Interval problems have many applications in reality because many objects, values, and ranges are intervals in nature, such as time intervals, distances, line segments, probabilities, etc. Problems on intervals are gaining attention also because intervals are among the most basic geometric objects, and for the same reason, computational geometry techniques find useful for attacking these problems. Specifically, the problems we study in this dissertation includes the following: balanced splitting on weighted intervals, minimizing the movements of spreading points, dispersing points on intervals, multiple barrier …


Pulse Height Spectra Analysis Of A Neutron Energy Tuning Assembly, Jason R. Stickney Mar 2018

Pulse Height Spectra Analysis Of A Neutron Energy Tuning Assembly, Jason R. Stickney

Theses and Dissertations

An energy tuning assembly (ETA) was previously designed and built for the purpose of irradiating samples with a combination of a thermonuclear and a prompt fission neutron spectrum. Initial research was performed to characterize the performance of the ETA at the Lawrence Berkeley National Laboratory 88-Inch Cyclotron using 33 MeV deuteron breakup on tantalum as the neutron source. This research analyzes detector responses collected from three EJ-309 detectors used to characterize the ETA generated neutron field. A signal processing chain was developed to reduce the full waveform data into a pulse height spectrum. The primary goal was to develop a …


Forecasting Lightning Initiation Utilizing Dual-Polarization Radar Parameters Over Washington, D.C., Sarah A. Olsen Mar 2018

Forecasting Lightning Initiation Utilizing Dual-Polarization Radar Parameters Over Washington, D.C., Sarah A. Olsen

Theses and Dissertations

Accurate forecasts of thunderstorms are vital to space launch, aviation, and public safety. Prior studies by Woodard (2011), Thurmond (2014), and Travis (2015) show that dual-polarization radar can be utilized to identify the presence of hydrometeors necessary for cloud charging. These studies emphasized that a combination of radar reflectivity (Z) and differential reflectivity (ZDR) predictors have the potential to improve forecast skill of lightning initiation over methods that rely on Z alone (Roeder and Pinder, 1998; Yang and King, 2010). Travis (2015) discovered two parameters, when used together, produced the best results: Z ≥ 36.5 dBZ and ZDR …


Opportunity Identification For New Product Planning: Ontological Semantic Patent Classification, Farshad Madani Feb 2018

Opportunity Identification For New Product Planning: Ontological Semantic Patent Classification, Farshad Madani

Dissertations and Theses

Intelligence tools have been developed and applied widely in many different areas in engineering, business and management. Many commercialized tools for business intelligence are available in the market. However, no practically useful tools for technology intelligence are available at this time, and very little academic research in technology intelligence methods has been conducted to date.

Patent databases are the most important data source for technology intelligence tools, but patents inherently contain unstructured data. Consequently, extracting text data from patent databases, converting that data to meaningful information and generating useful knowledge from this information become complex tasks. These tasks are currently …


Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt Jan 2018

Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt

Walden Dissertations and Doctoral Studies

Swiss bank traders are affected by technological and regulatory challenges, which may affect their broker voting process and may result in a change of trading and evaluation behavior in 2018. Compounded challenges exist when broker evaluation strategies are not effective or Markets in Financial Instruments Directive (MiFID) II compliant. This qualitative, single case study, built on efficient capital market hypothesis and innovative disruption theory, was focused on effective broker evaluation strategies after MiFID II in Switzerland. The sample consisted of 4 buy-side traders, who shared their unique perspectives. Methodological triangulation was achieved through semistructured interviews, a review of the institution's …


Algorithmic Issues In Some Disjoint Clustering Problems In Combinatorial Circuits, Zola Nailah Donovan Jan 2018

Algorithmic Issues In Some Disjoint Clustering Problems In Combinatorial Circuits, Zola Nailah Donovan

Graduate Theses, Dissertations, and Problem Reports

As the modern integrated circuit continues to grow in complexity, the design of very large-scale integrated (VLSI) circuits involves massive teams employing state-of-the-art computer-aided design (CAD) tools. An old, yet significant CAD problem for VLSI circuits is physical design automation. In this problem, one needs to compute the best physical layout of millions to billions of circuit components on a tiny silicon surface. The process of mapping an electronic design to a chip involves several physical design stages, one of which is clustering. Even for combinatorial circuits, there exist several models for the clustering problem. In particular, we consider the …