Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Regis University (58)
- San Jose State University (41)
- Air Force Institute of Technology (27)
- Brigham Young University (24)
- California Polytechnic State University, San Luis Obispo (23)
-
- Clemson University (21)
- Missouri University of Science and Technology (20)
- University of Massachusetts Amherst (17)
- Dartmouth College (12)
- Wayne State University (12)
- New Jersey Institute of Technology (11)
- Nova Southeastern University (11)
- California State University, San Bernardino (10)
- University of Nevada, Las Vegas (10)
- University of Texas at El Paso (10)
- Utah State University (10)
- Wright State University (10)
- Louisiana State University (9)
- William & Mary (9)
- Old Dominion University (7)
- University of Central Florida (7)
- University for Business and Technology in Kosovo (6)
- University of Tennessee, Knoxville (6)
- Virginia Commonwealth University (6)
- East Tennessee State University (5)
- Edith Cowan University (5)
- Georgia State University (5)
- University of Texas Rio Grande Valley (5)
- Marquette University (4)
- University of Denver (4)
- Keyword
-
- College for Professional Studies (58)
- School of Computer & Information Science (57)
- Regis University MSCIS thesis (19)
- MS Computer and Information Technology (18)
- Regis University MSCIT thesis (18)
-
- MS Database Technologies (9)
- Department of Computer Science and Engineering (8)
- Security (8)
- MS Systems Engineering (7)
- Applied sciences (6)
- MS Information Assurance (6)
- MS Information Technology Management (6)
- Machine learning (6)
- Regis University MSCIS Thesis (6)
- Regis University MSCIT Thesis (6)
- Computer networks--Security measures (5)
- Computer security (5)
- Database (5)
- MS Software and Information Systems (5)
- RFID (5)
- Virtualization (5)
- Daniel Felix Ritchie School of Engineering and Computer Science (4)
- Data mining (4)
- Database design (4)
- Image segmentation (4)
- Optimization (4)
- Simulation (4)
- Web 2.0 (4)
- Web site development (4)
- Algorithms (3)
- Publication
-
- Theses and Dissertations (66)
- Regis University Student Publications (comprehensive collection) (58)
- Master's Projects (41)
- Masters Theses (18)
- Open Access Dissertations (17)
-
- Electronic Theses and Dissertations (16)
- All Dissertations (13)
- Dissertations (13)
- CCE Theses and Dissertations (11)
- Master's Theses (11)
- Wayne State University Dissertations (11)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (10)
- Browse all Theses and Dissertations (10)
- Open Access Theses & Dissertations (10)
- Theses Digitization Project (10)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (10)
- Dissertations, Theses, and Masters Projects (9)
- Doctoral Dissertations (9)
- All Theses (8)
- LSU Doctoral Dissertations (7)
- Computer Engineering (5)
- Computer Science Dissertations (5)
- Computer Science and Software Engineering (5)
- Dartmouth College Undergraduate Theses (5)
- Theses and Dissertations - UTB/UTPA (5)
- Computer Science Theses & Dissertations (4)
- Dartmouth College Ph.D Dissertations (4)
- Master's Theses (2009 -) (4)
- Theses (4)
- Walden Dissertations and Doctoral Studies (4)
Articles 1 - 30 of 451
Full-Text Articles in Entire DC Network
P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz
P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz
Electronic Theses and Dissertations
Severe neuromuscular disorders can produce locked-in syndrome (LIS), a loss of nearly all voluntary muscle control. A brain-computer interface (BCI) using the P300 event-related potential provides communication that does not depend on neuromuscular activity and can be useful for those with LIS. Currently, there is no way of determining the effectiveness of P300-based BCIs without testing a person's performance multiple times. Additionally, P300 responses in BCI tasks may not resemble the typical P300 response. I sought to clarify the relationship between the P300 response and BCI task parameters and examine the possibility of a predictive relationship between traditional oddball tasks …
A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun
A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun
Theses and Dissertations
Empirical research is inexact and error-prone leading researchers to agree that replication of experiments is a necessary step to validating empirical results. Unfortunately, replicating experiments requires substantial investments in manpower and time. These resource requirements can be reduced by incorporating component reuse when building tools for empirical experimentation. Bokeo is an initiative within the Sequoia Lab of the BYU Computer Science Department to develop a platform to assist in the empirical study of software engineering. The i3Persistence Framework is a component of Bokeo which enables researchers to easily build and rapidly deploy tools for empirical experiments by providing an easy-to-use …
Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler
Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler
Theses and Dissertations
Knowledge transferred during meetings is often ephemeral in nature and thus must be captured if it is to be retained. Ideally, a capture solution should be able to 1) accommodate any number of screens without sacrificing image quality and 2) allow dynamic access to a complete media capture while the capture is taking place. Both students and employees can benefit from the information captured during the lectures and meetings for enhanced discussion and afterward for knowledge retention. Current systems do not support multiple screen capture well, and no system supports dynamic access to the active meeting capture during the meeting. …
Advanced Topics On State Complexity Of Combined Operations, Yuan Gao
Advanced Topics On State Complexity Of Combined Operations, Yuan Gao
Electronic Thesis and Dissertation Repository
State complexity is a fundamental topic in formal languages and automata theory. The study of state complexity is also strongly motivated by applications of finite automata in software engineering, programming languages, natural language and speech processing and other practical areas. Since many of these applications use automata of large sizes, it is important to know the number of states of the automata. In this thesis, we firstly discuss the state complexities of individual operations on regular languages, including union, intersection, star, catenation, reversal and so on. The state complexity of an operation on unary languages is usually different from that …
Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens
Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens
Regis University Student Publications (comprehensive collection)
The concept of real-time data warehousing has grown in popularity in recent years as organizations demand access to critical pieces of data in real-time to produce analytics and make business decisions to gain competitive advantage. Real-time data warehousing systems differ substantially from traditional data warehousing systems, thus, presenting a unique set of organizational and operational challenges. The basis for the research was to investigate whether adequate information is available regarding the organizational and operational challenges of real-time data warehousing and whether that information is available to the database community. This exploration was done by gathering primary research, conducting a case …
Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu
Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu
Computer Science Dissertations
Wildfires have significant impact on both ecosystems and human society. To effectively manage wildfires, simulation models are used to study and predict wildfire spread. The accuracy of wildfire spread simulations depends on many factors, including GIS data, fuel data, weather data, and high-fidelity wildfire behavior models. Unfortunately, due to the dynamic and complex nature of wildfire, it is impractical to obtain all these data with no error. Therefore, predictions from the simulation model will be different from what it is in a real wildfire. Without assimilating data from the real wildfire and dynamically adjusting the simulation, the difference between the …
A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu
A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu
Computer Science Dissertations
Pedestrian crowd simulation explores crowd behaviors in virtual environments. It is extensively studied in many areas, such as safety and civil engineering, transportation, social science, entertainment industry and so on. As a common phenomenon in pedestrian crowds, grouping can play important roles in crowd behaviors. To achieve more realistic simulations, it is important to support group modeling in crowd behaviors. Nevertheless, group modeling is still an open and challenging problem. The influence of groups on the dynamics of crowd movement has not been incorporated into most existing crowd models because of the complexity nature of social groups. This research develops …
Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja
Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja
Master's Projects
A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the models as the IDE creates them automatically. The IDE offers a simple interface for users to edit the schema of their models. Users can add or delete data from their models without dealing with the SQL insert/delete statements. The IDE …
Trusted Mobile Overlays, Robert Scott Robertson
Trusted Mobile Overlays, Robert Scott Robertson
Theses and Dissertations
Sensitive information is increasingly moving online and as data moves further from the control of its owner, there are increased opportunities for it to fall into malicious hands. The Web is comprised of three untrusted components where there is a risk of information compromise: networks, service providers, and clients. This thesis presents Trusted Mobile Overlays: a system that leverages trusted mobile devices to protect users from these untrusted components of the Web, while minimizing deployment difficulties. It presents a high-level design of the system as well as a prototype that implements the design.
Preventing Computer Identity Theft, Donald R. Mcdaniel
Preventing Computer Identity Theft, Donald R. Mcdaniel
Regis University Student Publications (comprehensive collection)
The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic.
Asynchronous Database Drivers, Michael Adam Heath
Asynchronous Database Drivers, Michael Adam Heath
Theses and Dissertations
Existing database drivers use blocking socket I/O to exchange data with relational database management systems (RDBMS). To concurrently send multiple requests to a RDBMS with blocking database drivers, a separate thread must be used for each request. This approach has been used successfully for many years. However, we propose that using non-blocking socket I/O is faster and scales better under load. In this paper we introduce the Asynchronous Database Connectivity in Java (ADBCJ) framework. ADBCJ provides a common API for asynchronous RDBMS interaction. Various implementations of the ADBCJ API are used to show how utilizing non-blocking socket I/O is faster …
Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan
Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan
Theses and Dissertations
We demonstrate the success of recurrent neural networks in gene network inference and expression prediction using a hybrid of particle swarm optimization and differential evolution to overcome the classic obstacle of local minima in training recurrent neural networks. We also provide an improved validation framework for the evaluation of genetic network modeling systems that will result in better generalization and long-term prediction capability. Success in the modeling of gene regulation and prediction of gene expression will lead to more rapid discovery and development of therapeutic medicine, earlier diagnosis and treatment of adverse conditions, and vast advancements in life science research.
Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall
Regis University Student Publications (comprehensive collection)
Web applications , especially those based on interpreted programming languages , are quickly becoming more utilized and more commonplace than traditional client applications. Despite this growth, no open solution has yet fulfilled the need of a risk-reducing development framework that supports test-driven methodologies and tools designed to coordinate the resources responsible for the most effective development of web applications based on interpreted programming languages. This research paper presents a test-driven development framework consisting of openly available components that can be used by development teams writing web applications based on interpreted programming languages based on the methodologies and tools used by …
Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse
Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse
Theses and Dissertations
Complex concurrent APIs are difficult to reason about annually due to the exponential growth in the number of feasible schedules. Testing against reference solutions of these APIs is equally difficult as reference solutions implement an unknown set of allowed behaviors, and programmers have no way to directly control schedules or API internals to expose or reproduce errors. The work in this paper mechanically generates a drop-in replacement for a concurrent API from a formal specification. The specification is a guarded command system with first-order logic that is compiled into a core calculus. The term rewriting system is connected to actual …
A Type Analysis Of Rewrite Strategies, Azamat Mametjanov
A Type Analysis Of Rewrite Strategies, Azamat Mametjanov
Student Work
Rewrite strategies provide an algorithmic rewriting of terms using strategic compositions of rewrite rules. Due to the programmability of rewrites, errors are often made due to incorrect compositions of rewrites or incorrect application of rewrites to a term within a strategic rewriting program. In practical applications of strategic rewriting, testing and debugging becomes substantially time-intensive for large programs applied to large inputs derived from large term grammars. In essence, determining which rewrite in what position in a term did or did not re comes down to logging, tracing and/or di -like comparison of inputs to outputs. In this thesis, we …
A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy
A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy
Doctoral Dissertations
The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …
Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti
Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti
UNLV Theses, Dissertations, Professional Papers, and Capstones
The leader election problem is one of the fundamental problems in distributed computing. It has applications in almost every domain. In dynamic networks, topology is expected to change frequently. An algorithm A is self-stabilizing if, starting from a completely arbitrary configuration, the network will eventually reach a legitimate configuration.
Note that any self-stabilizing algorithm for the leader election problem is also an algorithm for the dynamic leader election problem, since when the topology of the network changes, we can consider that the algorithm is starting over again from an arbitrary state. There are a number of such algorithms in the …
A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im
A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im
All Dissertations
The degree to which a software system possesses specified levels of software quality attributes, such as performance and modifiability, often have more influence on the success and failure of those systems than the functional requirements. One method of improving the level of a software quality that a product possesses is to reason about the structure of the software architecture in terms of how well the structure supports the quality. This is accomplished by reasoning through software quality attribute scenarios while designing the software architecture of the system.
As society relies more heavily on software systems, the dependability of those systems …
Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im
Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im
All Dissertations
The explicit design of the architecture for a software product is a well established part of development projects. As the software architecture descriptions are becoming larger and more complex, there is more likelihood of defects being present in the software architecture. Studies have shown that a defect in the software architecture that has propagated to the development phase is very expensive to fix. To prevent such propagation of defects, this research proposes to provide debugging support for software architecture design.
Debugging is commonly used in programming languages to effectively find the cause of a failure and locate the error to …
Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein
Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
This thesis presents two deduplication techniques that overcome the following critical and long-standing weaknesses of rule-based deduplication: (1) traditional rule-based deduplication requires significant manual tuning of the individual rules, including the selection of appropriate thresholds; (2) the accuracy of rule-based deduplication degrades when there are missing data values, significantly reducing the efficacy of the expert-defined deduplication rules.
The first technique is a novel rule-level match-score fusion algorithm that employs kernel-machine-based learning to discover the decision threshold for the overall system automatically. The second is a novel clue-level match-score fusion algorithm that addresses both Problem 1 and 2. This unique solution …
A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones
A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones
All Dissertations
Operating system virtualization tools such as VMWare, XEN, and Linux KVM export only minimally capable SVGA graphics adapters. This paper describes the design and implementation of system
that virtualizes high-performance graphics cards of arbitrary design to support the construction of authentic device drivers. Drivers written for the virtual cards can be used verbatim, without special function calls or kernel modifications, as drivers for real cards, should real cards of the same design exist. While this allows for arbitrary design, it is not able to model performance characteristics. We describe a new kernel system that allows for arbitrarily changing the performance …
Evolutionary Strategies For Data Mining, Rose Lowe
Evolutionary Strategies For Data Mining, Rose Lowe
All Dissertations
Learning classifier systems (LCS) have been successful in generating rules for solving classification problems in data mining. The rules are of the form IF condition THEN action. The condition encodes the features of the input space and the action encodes the class label. What is lacking in those systems is the ability to express each feature using a function that is appropriate for that feature. The genetic algorithm is capable of doing this but cannot because only one type of membership function
is provided. Thus, the genetic algorithm learns only the shape and placement of the membership function, and in …
Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung
Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung
Master's Projects
False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.
With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.
Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …
An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna
An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna
Master's Projects
Generally, search engines perform the ranking of web pages in an offline mode, which is after the web pages have been retrieved and stored in the database. The existing HITS algorithm (Kleinberg, 1996) operates in an offline mode to perform page rank calculation. In this project, we have implemented an online mode of page ranking for this algorithm. This will improve the overall performance of the Search Engine. This report describes the approach used to implement and test this algorithm. Comparison results performed against other existing search engines are also presented in this report. This is helpful in describing the …
Japanese Kanji Suggestion Tool, Sujata Dongre
Japanese Kanji Suggestion Tool, Sujata Dongre
Master's Projects
Many times, we can see that if we enter a misspelled search term in any of the search engines like Google, it will provide some help with "Did you mean:...." In my project, I am providing some suggestions for the wrong Japanese text entered by a user.
The Japanese language has three types of writing styles - hiragana, katakana and the most difficult, kanji. A single kanji symbol may be used to write one or more different compound words. From the point of view of the reader, kanji symbols are said to have one or more different "readings." Hence, sometimes …
View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna
View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna
Master's Projects
The aim of the project is to build a Web-based IDE (Integrated Development Environment) that enables users to create a Web application in PHP on the CakePHP framework. The view component of the IDE allows the users to build the CakePHP view templates, which include the HTML tags which can be properly linked with the controller functions. Users will be able to create the HTML form elements only by performing certain drags, drops and clicks. This project will create dynamic view elements, which is achieved by connecting them to the Controllers components. This IDE helps the users to create dynamic …
One Social, Sowmya Sampath
One Social, Sowmya Sampath
Master's Projects
Facebook streams and Twitter tweets represent user content in two common social media systems. Users often have accounts on both these systems and to keep their content current for both of them they must update each separately. It is thus difficult to manage and maintain both of these social networks together. The goal of this project is to build a social website called One Social, where users can view their Facebook streams and Twitter tweets in one single view and thereby easily organize and maintain their updates. In One Social, users can enter a status message and can share it …
Approximate Disassembly Using Dynamic Programming, Abhishek Shah
Approximate Disassembly Using Dynamic Programming, Abhishek Shah
Master's Projects
Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.
In …
A Study On Masquerade Detection, Lin Huang
A Study On Masquerade Detection, Lin Huang
Master's Projects
In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.
An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …
Web-Based Ide For Interfacing View Controller, Tejasvi Palvai
Web-Based Ide For Interfacing View Controller, Tejasvi Palvai
Master's Projects
The main idea of this project is to develop a web-based IDE, which helps users to avoid installing or configuring the Desktop IDE. It also enables users to create XHTML pages using the drag and drop mechanism in Struts. Struts extends the Java Servlet API to encourage developers to adopt the MVC (Model-View- Controller) architecture. In this project, a web application for interfacing the view and controller parts of the MVC architecture was developed. This web-based IDE connects the View and Controller components when the user drags and drops HTML elements in the UI of the IDE. With this project, …