Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

West Virginia University

Theses/Dissertations

2012

Computer science

Articles 1 - 13 of 13

Full-Text Articles in Entire DC Network

Analysis And Detection Of Fingerprint Creases, Olaoluwa Peter Laseinde Dec 2012

Analysis And Detection Of Fingerprint Creases, Olaoluwa Peter Laseinde

Graduate Theses, Dissertations, and Problem Reports

Fingerprint is a biometric trait that is widely used for human identification and verification. Most fingerprint biometric systems make use of certain salient features on the fingerprint, including minutiae points, pores, and singular points, for comparing two fingerprint images. In this work, we explore the possibility of using fingerprint creases for comparing two fingerprints. Creases can be described as white lines or scars on a fingerprint image. Recent studies have determined that some creases are genetically influenced although the origin of creases has not been completely characterized. While no published work exists for crease matching, some studies have explored the …


The Effects Of Index Storage On Ranked Information Retrieval, James E. Mantheiy Jr. Dec 2012

The Effects Of Index Storage On Ranked Information Retrieval, James E. Mantheiy Jr.

Graduate Theses, Dissertations, and Problem Reports

Information retrieval is the process of recalling and ordering all relevant documents based on a user's search query. Examples of information retrieval systems are Google, Bing, and Yahoo search. In order to perform an effective search, these systems utilize an inverted index for mapping content, such as words, to the original document. It is widely believed there are two options for implementing an inverted index and these options are in memory or as a file. This investigation looks at implementing an inverted index as a table in a database as compared to the other two options. In addition, this investigation …


Robust Real-Time Recognition Of Action Sequences Using A Multi-Camera Network, Rahul Ratnakar Kavi Dec 2012

Robust Real-Time Recognition Of Action Sequences Using A Multi-Camera Network, Rahul Ratnakar Kavi

Graduate Theses, Dissertations, and Problem Reports

Real-time identification of human activities in urban environments is increasingly becoming important in the context of public safety and national security. Distributed camera networks that provide multiple views of a scene are ideally suited for real-time action recognition. However, deployments of multi-camera based real-time action recognition systems have thus far been inhibited because of several practical issues and restrictive assumptions that are typically made such as the knowledge of a subjects orientation with respect to the cameras, the duration of each action and the conformation of a network deployment during the testing phase to that of a training deployment. In …


A Principled Methodology: A Dozen Principles Of Software Effort Estimation, Ekrem Kocaguneli Dec 2012

A Principled Methodology: A Dozen Principles Of Software Effort Estimation, Ekrem Kocaguneli

Graduate Theses, Dissertations, and Problem Reports

Software effort estimation (SEE) is the activity of estimating the total effort required to complete a software project. Correctly estimating the effort required for a software project is of vital importance for the competitiveness of the organizations. Both under- and over-estimation leads to undesirable consequences for the organizations. Under-estimation may result in overruns in budget and schedule, which in return may cause the cancellation of projects; thereby, wasting the entire effort spent until that point. Over-estimation may cause promising projects not to be funded; hence, harming the organizational competitiveness.;Due to the significant role of SEE for software organizations, there is …


Systems With Session-Based Workloads: Assessing Performance And Reliability, Nikola Janevski Aug 2012

Systems With Session-Based Workloads: Assessing Performance And Reliability, Nikola Janevski

Graduate Theses, Dissertations, and Problem Reports

Many systems, including the Web and Software as a Service (SaaS), are best characterized with session-based workloads. Empirical studies have shown that Web session arrivals exhibit long range dependence and that the number of requests in a session is well modeled with skewed or heavy-tailed distributions. However, models that account for session workloads characterized by empirically observed phenomena and studies of their impact on performance and reliability metrics are lacking.;For assessing performance, we use a feedback queue to account for session-based workloads in a physically meaningful way and use simulation to analyze the behavior of the Web system under Long …


Homogeneous And Heterogeneous Face Recognition: Enhancing, Encoding And Matching For Practical Applications, Francesco Nicolo May 2012

Homogeneous And Heterogeneous Face Recognition: Enhancing, Encoding And Matching For Practical Applications, Francesco Nicolo

Graduate Theses, Dissertations, and Problem Reports

Face Recognition is the automatic processing of face images with the purpose to recognize individuals. Recognition task becomes especially challenging in surveillance applications, where images are acquired from a long range in the presence of difficult environments. Short Wave Infrared (SWIR) is an emerging imaging modality that is able to produce clear long range images in difficult environments or during night time. Despite the benefits of the SWIR technology, matching SWIR images against a gallery of visible images presents a challenge, since the photometric properties of the images in the two spectral bands are highly distinct.;In this dissertation, we describe …


A Context Centric Model For Building A Knowledge Advantage Machine Based On Personal Ontology Patterns, Luyi Wang May 2012

A Context Centric Model For Building A Knowledge Advantage Machine Based On Personal Ontology Patterns, Luyi Wang

Graduate Theses, Dissertations, and Problem Reports

Throughout the industrial era societal advancement could be attributed in large part to introduction a plethora of electromechanical machines all of which exploited a key concept known as Mechanical Advantage. In the post-industrial era exploitation of knowledge is emerging as the key enabler for societal advancement. With the advent of the Internet and the Web, while there is no dearth of knowledge, what is lacking is an efficient and practical mechanism for organizing knowledge and presenting it in a comprehensible form appropriate for every context. This is the fundamental problem addressed by my dissertation.;We begin by proposing a novel architecture …


Understanding Search-Based Software Engineering, Paul William Mcburney May 2012

Understanding Search-Based Software Engineering, Paul William Mcburney

Graduate Theses, Dissertations, and Problem Reports

Pareto Optimization is a method of finding the space of best solutions possible given multiple class dimensions. In practice, however, it is difficult for users to visualize how solutions are spaced across this multi-dimensional frontier. Existing algorithms like NSGA-II are capable of quickly finding the Pareto frontier. However, users cannot use these algorithms to understand how changes to a solution effect the qualities of that solution.;In response to these issues, this paper presents "HOW". Not only is "HOW" capable of finding the Pareto frontier across multiple dimensions, but HOW can also explain how each point was derived, and compare points …


Family Relationship Analysis In Photos, Xiaolong Wang Jan 2012

Family Relationship Analysis In Photos, Xiaolong Wang

Graduate Theses, Dissertations, and Problem Reports

Family relationship analysis has many potential applications, ranging from homeland security through to image search and social activity analysis. In our work, we present five computational problems for family relationship analysis in face photos. Studying these challenging problems is important and useful for semantic image understanding and social context extraction. In our study, the familial traits are learned from pairs of salient local facial parts using discriminative approaches. It is motivated by human perception studies on kinship recognition and the existence of familial traits through genetic inheritance. Second, kinship verification is performed on a pair of faces by integrating the …


Iris Indexing And Ear Classification, Ravindra B. Gadde Jan 2012

Iris Indexing And Ear Classification, Ravindra B. Gadde

Graduate Theses, Dissertations, and Problem Reports

To identify an individual using a biometric system, the input biometric data has to be typically compared against that of each and every identity in the existing database during the matching stage. The response time of the system increases with the increase in number of individuals (i.e., database size), which is not acceptable in real time monitoring or when working on large scale data. This thesis addresses the problem of reducing the number of database candidates to be considered during matching in the context of iris and ear recognition. In the case of iris, an indexing mechanism based on Burrows …


Improving Iris Recognition Through Quality And Interoperability Metrics, Nathan D. Kalka Jan 2012

Improving Iris Recognition Through Quality And Interoperability Metrics, Nathan D. Kalka

Graduate Theses, Dissertations, and Problem Reports

The ability to identify individuals based on their iris is known as iris recognition. Over the past decade iris recognition has garnered much attention because of its strong performance in comparison with other mainstream biometrics such as fingerprint and face recognition. Performance of iris recognition systems is driven by application scenario requirements. Standoff distance, subject cooperation, underlying optics, and illumination are a few examples of these requirements which dictate the nature of images an iris recognition system has to process. Traditional iris recognition systems, dubbed "stop and stare", operate under highly constrained conditions. This ensures that the captured image is …


Vcast: A Distance-Sensitive Scalable Information Dissemination Protocol, Raja Abhinay Moparthi Jan 2012

Vcast: A Distance-Sensitive Scalable Information Dissemination Protocol, Raja Abhinay Moparthi

Graduate Theses, Dissertations, and Problem Reports

The future of intelligent transportation systems lies in dealing with safety and navigation of vehicles. Building a technology that provides the real-time information about the state of other vehicles like its location, speed and direction would help in developing a system that ensures safety along with navigation. However, the network limitations pose difficulty in obtaining the state information over multiple-hops, because of the bandwidth limitations and congestion in the shared wireless channel. Overcoming this challenge would yield an intelligent transportation system which gives information regarding the collisions, lane changes and merges, emergency vehicle approaching alerts, stopped vehicle alerts, etc., over …


A Work-Pattern Centric Approach To Building A Personal Knowledge Advantage Machine, Daniel Sloan Jan 2012

A Work-Pattern Centric Approach To Building A Personal Knowledge Advantage Machine, Daniel Sloan

Graduate Theses, Dissertations, and Problem Reports

A work pattern, also known as a usage pattern, can be broadly defined as the methods by which a user typically utilizes a particular system. Data mining has been applied to web usage patterns for a variety of purposes. This thesis presents a framework by which data mining techniques could be used to extract patterns from an individual's work flow data in order facilitate a new type of architecture known as a knowledge advantage machine. This knowledge advantage machine is a type of semantic desktop and semantic web application that would assist people in constructing their own personal knowledge networks, …