Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Masters Theses

2013

Computer Sciences

Institution
Keyword

Articles 1 - 19 of 19

Full-Text Articles in Entire DC Network

Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez Dec 2013

Mapping Spatial Thematic Accuracy Using Indicator Kriging, Maria I. Martinez

Masters Theses

Thematic maps derived from remote sensing imagery is increasingly being used in environmental and ecological modeling. Spatial information in these maps however is not free of error. Different methodologies such as error matrices are used to assess the accuracy of the spatial information. However, most of the methods commonly used for describing the accuracy assessment of thematic data fail to describe spatial differences of the accuracy across an area of interest. This thesis describes the use of indicator kriging as a geostatistical method for mapping the spatial accuracy of thematic maps. The method is illustrated by constructing accuracy maps for …


An Implementation Of Controller Area Network Bus Analyzer Using Microblaze And Petalinux, Tung-Hsun Tsou Aug 2013

An Implementation Of Controller Area Network Bus Analyzer Using Microblaze And Petalinux, Tung-Hsun Tsou

Masters Theses

This paper presents a controller area network (CAN) monitor system created in a Field-Programmable Gate Array (FPGA) board, which is Xilinx SP605. The goals of this research are to let the system demonstrate a reliable CAN bus monitor system, and to show the Xilinx MicroBlaze and PetaLinux design flow. This system can be used to observe the CAN bus messages by means of C program and embedded Linux environment.

A Xilinx MicroBlaze soft processor is used to read CAN information from the external CAN bus controller, Microchip MCP2515. Two implementations, a stand-alone system and a Linux system, are built to …


Study Of Feasability For Phase Difference Extraction Using Software Defined Radio In Location Analysis, Paul Miller Aug 2013

Study Of Feasability For Phase Difference Extraction Using Software Defined Radio In Location Analysis, Paul Miller

Masters Theses

Here is a method for using the phase of an HF radio signal for use in location analysis. This computation is implemented in a software defined radio processing block in the GNU Radio environment. The signals analyzed are received by an Ettus Research USRP SDR. We created a phase analysis system called WMU Rootsync, which compares the roots of a received signal to the roots of a generated reference signal for the phase analysis. This research describes a prototype method for phase analysis only. Future projects may use these ideas differently than presented here. We intend for future projects to …


Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise Aug 2013

Automated Generation Of Simulink Models For Enumeration Hybrid Automata, David Aaron Heise

Masters Theses

An enumeration hybrid automaton has been shown in principle to be ready for automated transformation into a Simulink implementation. This paper describes a strategy for and a demonstration of automated construction. This is accomplished by designing a data model which represents EHA data and providing a mapping from EHA data points to Simulink blocks.


Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton May 2013

Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton

Masters Theses

The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …


A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi May 2013

A Study Of Possible Optimizations For The Task Scheduler ‘Quark’ On The Shared Memory Architecture, Vijay Gopal Joshi

Masters Theses

Multicore processors are replacing most of the single core processors nowadays.

Current trends show that there will be increasing numbers of cores on a single chip in the coming future. However, programming multicore processors remains bug prone and less productive. Thus, making use of a runtime to schedule tasks on multicore processor hides most of the complexities of parallel programming to improve productivity. QUARK is one of the runtimes available for the multicore processors. This work looks at identifying and solving performance bottlenecks for QUARK on the shared memory architecture. The problem of finding bottlenecks is divided into two parts, …


Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton May 2013

Tor Bridge Distribution Powered By Threshold Rsa, Jordan Hunter Deyton

Masters Theses

Since its inception, Tor has offered anonymity for internet users around the world. Tor now offers bridges to help users evade internet censorship, but the primary distribution schemes that provide bridges to users in need have come under attack. This thesis explores how threshold RSA can help strengthen Tor's infrastructure while also enabling more powerful bridge distribution schemes. We implement a basic threshold RSA signature system for the bridge authority and a reputation-based social network design for bridge distribution. Experimental results are obtained showing the possibility of quick responses to requests from honest users while maintaining both the secrecy and …


Sequence Mining Based Debugging Of Wireless Sensor Networks, Kefa Lu May 2013

Sequence Mining Based Debugging Of Wireless Sensor Networks, Kefa Lu

Masters Theses

Wireless Sensor Network (WSN) applications are prone to bugs and failures due to their typical characteristics, such as extensively distributed, heavily concurrent and resources restricted. It becomes critical to develop efficient debugging systems for WSN applications. A flexible and generic debugger for WSN applications is highly demanded. In this thesis, I proposed and developed a flexible and iterative WSN debugging system based on sequence analyzing and data mining techniques. At first, I developed vectorized Probabilistic Suffix Tree (vPST), a variable memory length model to extract and store sequential information from program runtime traces in compact suffix tree based vectors, based …


Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu Jan 2013

Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu

Masters Theses

"Although shopping is a social activity frequently performed with friends and family members, most online shopping is done alone. With the development of Web 2.0 technologies and the increasing popularity of social networking sites, online social shopping has emerged as a new phenomenon that allows more social interaction, participation, and satisfaction for customers while shopping online. Therefore, companies have started to use social shopping tools in their e-commerce websites to facilitate online social shopping. Co-browsing is one of the more recent online social shopping tools available, enabling users to shop or browse together by offering synchronized web views and chat …


Search-Based Model Summarization, Lokesh Krishna Ravichandran Jan 2013

Search-Based Model Summarization, Lokesh Krishna Ravichandran

Masters Theses

"Large systems are complex and consist of numerous components and interactions between the components. Hence managing such large systems is a cumbersome and time consuming task. Large systems are usually described at the model level. But the large number of components in such models makes it difficult to modify. As a consequence, developers need a solution to rapidly detect which model components to revise. Effective solution is to generate a model summary. Although existing techniques are powerful enough to provide good summaries based on lexical information (relevant terms), they do not make use of structural information (component structure) well. In …


Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan Jan 2013

Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan

Masters Theses

"The cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services from a shared pool of configurable computing resources. By using these data storage services, the data owners can relieve the burden of local data storage and maintenance. However, since data owners and the cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data …


Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden Jan 2013

Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden

Masters Theses

"Deeply embedded Cyber Physical Systems (CPS) are infrastructures that have significant cyber and physical components that interact with each other in complex ways. These interactions can violate a system's security policy, leading to the leakage of rights and unintended information flow. This thesis will explore information flow as it uses a public channel. In order to exemplify the use of the public channel, a vehicle being composed of the computer system and its operators will show how information is disclosed to an observer. The example is made up of a vehicle traveling across some terrain with an observer watching the …


Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra Jan 2013

Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra

Masters Theses

"A portal is a browser-based application that provides a web platform for users to improve inter-department collaboration and customer service. Portals are classified either as internal facing portals or external public facing portals. This study addresses the problems facing an internal portal related to its contents, functions and usability and provides a list of essential contents and functions that it should include through integrating theories and industry best practices. The theory framework is based on literature review and the industry best practices are based on the analysis of a number of internal portals of companies used as case studies. These …


Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg Jan 2013

Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg

Masters Theses

"As computers are increasingly relied upon to perform tasks of increasing complexity affecting many aspects of society, it is imperative that the underlying computational methods performing the tasks have high performance in terms of effectiveness and scalability. A common solution employed to perform such complex tasks are computational intelligence (CI) techniques. CI techniques use approaches influenced by nature to solve problems in which traditional modeling approaches fail due to impracticality, intractability, or mathematical ill-posedness. While CI techniques can perform considerably better than traditional modeling approaches when solving complex problems, the scalability performance of a given CI technique alone is not …


Secure Design Defects Detection And Correction, Wenquan Wang Jan 2013

Secure Design Defects Detection And Correction, Wenquan Wang

Masters Theses

"Bad design and software defects often make source codes hard to understand and lead to maintenance difficulties. In order to detect and fix such defects, researchers have systematically investigated these issues and designed different effective algorithms to tackle the problems. However, most of these methods need source codes/models for defect detection and correction. Commercial companies, like banks, may not be willing to provide their source models due to data security. Therefore, it is a huge challenge to detect software detects by a consulting company as well as to keep source models confidential. This thesis analyze security issues in existing approaches …


Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz Jan 2013

Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz

Masters Theses

"A Sybil attack is one where an adversary assumes multiple identities with the purpose of defeating an existing reputation system. When Sybil attacks are launched in vehicular networks, an added challenge in detecting malicious nodes is mobility that makes it increasingly difficult to tie a node to the location of attacks. In this thesis, we present an innovative protocol for Sybil detection in vehicular networks. Considering that vehicular networks are cyber-physical systems integrating cyber and physical components, our technique exploits well grounded results in the physical (i.e., transportation) domain to tackle the Sybil problem in the cyber domain. Compared to …


Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler Jan 2013

Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler

Masters Theses

"The published histories of technical writing textbooks do not usually include many women-authored textbooks. To find out why women-authored textbooks have been marginalized in these pedagogical histories, I selected seven women-authored textbooks and four men-authored textbooks published from 1923 to 1973, investigated the backgrounds of the authors and key features of their textbooks, and used the collected data to compare the women-authored textbooks to the men-authored textbooks. I was not able to find any reason why the women-authored textbooks have been or should be marginalized in histories of technical writing textbooks; however, my study had several limitations. My thesis begins …


Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young Jan 2013

Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young

Masters Theses

"This study examines the style of chemical engineering research articles to discover stylistic trends that may be applicable to authors looking to publish their own research. Rhetorical stylistic analysis was used as a research method to allow for thorough analysis of all articles in the sample. Ten research articles from the two prominent chemical engineering journals were chosen using specific criteria to constitute a sample of articles that could most accurately represent the population of chemical engineering research articles. Each article was then analyzed line by line to identify markers of chemical engineering research article style, including the following: ▬Use …


Internet Accessible Remote Real-Time Laboratory For Computer Networking Curriculum, Oyindamola Idowu Jan 2013

Internet Accessible Remote Real-Time Laboratory For Computer Networking Curriculum, Oyindamola Idowu

Masters Theses

Despite the availability of equipment required to teach hands-on laboratory practices in a computer networking curriculum, educators are faced with the challenge of extending such practices to students in remote locations. Distance learning has become a substantial part of the current education system, requiring institutes of learning adjusting from traditional face-to-face courses to content that can be carried out over the internet so that students can complete part or all the requirements for certain courses in an online modality. Unfortunately, traditional networking laboratories were designed with the assumption students will be physically present. This research is aimed to provide at …