Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 13 of 13
Full-Text Articles in Entire DC Network
Analysis And Detection Of Fingerprint Creases, Olaoluwa Peter Laseinde
Analysis And Detection Of Fingerprint Creases, Olaoluwa Peter Laseinde
Graduate Theses, Dissertations, and Problem Reports
Fingerprint is a biometric trait that is widely used for human identification and verification. Most fingerprint biometric systems make use of certain salient features on the fingerprint, including minutiae points, pores, and singular points, for comparing two fingerprint images. In this work, we explore the possibility of using fingerprint creases for comparing two fingerprints. Creases can be described as white lines or scars on a fingerprint image. Recent studies have determined that some creases are genetically influenced although the origin of creases has not been completely characterized. While no published work exists for crease matching, some studies have explored the …
The Effects Of Index Storage On Ranked Information Retrieval, James E. Mantheiy Jr.
The Effects Of Index Storage On Ranked Information Retrieval, James E. Mantheiy Jr.
Graduate Theses, Dissertations, and Problem Reports
Information retrieval is the process of recalling and ordering all relevant documents based on a user's search query. Examples of information retrieval systems are Google, Bing, and Yahoo search. In order to perform an effective search, these systems utilize an inverted index for mapping content, such as words, to the original document. It is widely believed there are two options for implementing an inverted index and these options are in memory or as a file. This investigation looks at implementing an inverted index as a table in a database as compared to the other two options. In addition, this investigation …
Robust Real-Time Recognition Of Action Sequences Using A Multi-Camera Network, Rahul Ratnakar Kavi
Robust Real-Time Recognition Of Action Sequences Using A Multi-Camera Network, Rahul Ratnakar Kavi
Graduate Theses, Dissertations, and Problem Reports
Real-time identification of human activities in urban environments is increasingly becoming important in the context of public safety and national security. Distributed camera networks that provide multiple views of a scene are ideally suited for real-time action recognition. However, deployments of multi-camera based real-time action recognition systems have thus far been inhibited because of several practical issues and restrictive assumptions that are typically made such as the knowledge of a subjects orientation with respect to the cameras, the duration of each action and the conformation of a network deployment during the testing phase to that of a training deployment. In …
A Principled Methodology: A Dozen Principles Of Software Effort Estimation, Ekrem Kocaguneli
A Principled Methodology: A Dozen Principles Of Software Effort Estimation, Ekrem Kocaguneli
Graduate Theses, Dissertations, and Problem Reports
Software effort estimation (SEE) is the activity of estimating the total effort required to complete a software project. Correctly estimating the effort required for a software project is of vital importance for the competitiveness of the organizations. Both under- and over-estimation leads to undesirable consequences for the organizations. Under-estimation may result in overruns in budget and schedule, which in return may cause the cancellation of projects; thereby, wasting the entire effort spent until that point. Over-estimation may cause promising projects not to be funded; hence, harming the organizational competitiveness.;Due to the significant role of SEE for software organizations, there is …
Systems With Session-Based Workloads: Assessing Performance And Reliability, Nikola Janevski
Systems With Session-Based Workloads: Assessing Performance And Reliability, Nikola Janevski
Graduate Theses, Dissertations, and Problem Reports
Many systems, including the Web and Software as a Service (SaaS), are best characterized with session-based workloads. Empirical studies have shown that Web session arrivals exhibit long range dependence and that the number of requests in a session is well modeled with skewed or heavy-tailed distributions. However, models that account for session workloads characterized by empirically observed phenomena and studies of their impact on performance and reliability metrics are lacking.;For assessing performance, we use a feedback queue to account for session-based workloads in a physically meaningful way and use simulation to analyze the behavior of the Web system under Long …
Homogeneous And Heterogeneous Face Recognition: Enhancing, Encoding And Matching For Practical Applications, Francesco Nicolo
Homogeneous And Heterogeneous Face Recognition: Enhancing, Encoding And Matching For Practical Applications, Francesco Nicolo
Graduate Theses, Dissertations, and Problem Reports
Face Recognition is the automatic processing of face images with the purpose to recognize individuals. Recognition task becomes especially challenging in surveillance applications, where images are acquired from a long range in the presence of difficult environments. Short Wave Infrared (SWIR) is an emerging imaging modality that is able to produce clear long range images in difficult environments or during night time. Despite the benefits of the SWIR technology, matching SWIR images against a gallery of visible images presents a challenge, since the photometric properties of the images in the two spectral bands are highly distinct.;In this dissertation, we describe …
A Context Centric Model For Building A Knowledge Advantage Machine Based On Personal Ontology Patterns, Luyi Wang
Graduate Theses, Dissertations, and Problem Reports
Throughout the industrial era societal advancement could be attributed in large part to introduction a plethora of electromechanical machines all of which exploited a key concept known as Mechanical Advantage. In the post-industrial era exploitation of knowledge is emerging as the key enabler for societal advancement. With the advent of the Internet and the Web, while there is no dearth of knowledge, what is lacking is an efficient and practical mechanism for organizing knowledge and presenting it in a comprehensible form appropriate for every context. This is the fundamental problem addressed by my dissertation.;We begin by proposing a novel architecture …
Understanding Search-Based Software Engineering, Paul William Mcburney
Understanding Search-Based Software Engineering, Paul William Mcburney
Graduate Theses, Dissertations, and Problem Reports
Pareto Optimization is a method of finding the space of best solutions possible given multiple class dimensions. In practice, however, it is difficult for users to visualize how solutions are spaced across this multi-dimensional frontier. Existing algorithms like NSGA-II are capable of quickly finding the Pareto frontier. However, users cannot use these algorithms to understand how changes to a solution effect the qualities of that solution.;In response to these issues, this paper presents "HOW". Not only is "HOW" capable of finding the Pareto frontier across multiple dimensions, but HOW can also explain how each point was derived, and compare points …
Family Relationship Analysis In Photos, Xiaolong Wang
Family Relationship Analysis In Photos, Xiaolong Wang
Graduate Theses, Dissertations, and Problem Reports
Family relationship analysis has many potential applications, ranging from homeland security through to image search and social activity analysis. In our work, we present five computational problems for family relationship analysis in face photos. Studying these challenging problems is important and useful for semantic image understanding and social context extraction. In our study, the familial traits are learned from pairs of salient local facial parts using discriminative approaches. It is motivated by human perception studies on kinship recognition and the existence of familial traits through genetic inheritance. Second, kinship verification is performed on a pair of faces by integrating the …
Iris Indexing And Ear Classification, Ravindra B. Gadde
Iris Indexing And Ear Classification, Ravindra B. Gadde
Graduate Theses, Dissertations, and Problem Reports
To identify an individual using a biometric system, the input biometric data has to be typically compared against that of each and every identity in the existing database during the matching stage. The response time of the system increases with the increase in number of individuals (i.e., database size), which is not acceptable in real time monitoring or when working on large scale data. This thesis addresses the problem of reducing the number of database candidates to be considered during matching in the context of iris and ear recognition. In the case of iris, an indexing mechanism based on Burrows …
Improving Iris Recognition Through Quality And Interoperability Metrics, Nathan D. Kalka
Improving Iris Recognition Through Quality And Interoperability Metrics, Nathan D. Kalka
Graduate Theses, Dissertations, and Problem Reports
The ability to identify individuals based on their iris is known as iris recognition. Over the past decade iris recognition has garnered much attention because of its strong performance in comparison with other mainstream biometrics such as fingerprint and face recognition. Performance of iris recognition systems is driven by application scenario requirements. Standoff distance, subject cooperation, underlying optics, and illumination are a few examples of these requirements which dictate the nature of images an iris recognition system has to process. Traditional iris recognition systems, dubbed "stop and stare", operate under highly constrained conditions. This ensures that the captured image is …
Vcast: A Distance-Sensitive Scalable Information Dissemination Protocol, Raja Abhinay Moparthi
Vcast: A Distance-Sensitive Scalable Information Dissemination Protocol, Raja Abhinay Moparthi
Graduate Theses, Dissertations, and Problem Reports
The future of intelligent transportation systems lies in dealing with safety and navigation of vehicles. Building a technology that provides the real-time information about the state of other vehicles like its location, speed and direction would help in developing a system that ensures safety along with navigation. However, the network limitations pose difficulty in obtaining the state information over multiple-hops, because of the bandwidth limitations and congestion in the shared wireless channel. Overcoming this challenge would yield an intelligent transportation system which gives information regarding the collisions, lane changes and merges, emergency vehicle approaching alerts, stopped vehicle alerts, etc., over …
A Work-Pattern Centric Approach To Building A Personal Knowledge Advantage Machine, Daniel Sloan
A Work-Pattern Centric Approach To Building A Personal Knowledge Advantage Machine, Daniel Sloan
Graduate Theses, Dissertations, and Problem Reports
A work pattern, also known as a usage pattern, can be broadly defined as the methods by which a user typically utilizes a particular system. Data mining has been applied to web usage patterns for a variety of purposes. This thesis presents a framework by which data mining techniques could be used to extract patterns from an individual's work flow data in order facilitate a new type of architecture known as a knowledge advantage machine. This knowledge advantage machine is a type of semantic desktop and semantic web application that would assist people in constructing their own personal knowledge networks, …