Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2010

Computer Sciences

Institution
Keyword
Publication

Articles 1 - 30 of 451

Full-Text Articles in Entire DC Network

P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz Dec 2010

P300-Based Bci Performance Prediction Through Examination Of Paradigm Manipulations And Principal Components Analysis., Nicholas Edward Schwartz

Electronic Theses and Dissertations

Severe neuromuscular disorders can produce locked-in syndrome (LIS), a loss of nearly all voluntary muscle control. A brain-computer interface (BCI) using the P300 event-related potential provides communication that does not depend on neuromuscular activity and can be useful for those with LIS. Currently, there is no way of determining the effectiveness of P300-based BCIs without testing a person's performance multiple times. Additionally, P300 responses in BCI tasks may not resemble the typical P300 response. I sought to clarify the relationship between the P300 response and BCI task parameters and examine the possibility of a predictive relationship between traditional oddball tasks …


A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun Dec 2010

A Reusable Persistence Framework For Replicating Empirical Studies On Data From Open Source Repositories, Scott Bong-Soo Chun

Theses and Dissertations

Empirical research is inexact and error-prone leading researchers to agree that replication of experiments is a necessary step to validating empirical results. Unfortunately, replicating experiments requires substantial investments in manpower and time. These resource requirements can be reduced by incorporating component reuse when building tools for empirical experimentation. Bokeo is an initiative within the Sequoia Lab of the BYU Computer Science Department to develop a platform to assist in the empirical study of software engineering. The i3Persistence Framework is a component of Bokeo which enables researchers to easily build and rapidly deploy tools for empirical experiments by providing an easy-to-use …


Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler Dec 2010

Capture And Access Of Multiple Screen Presentations, Kelv H. Cutler

Theses and Dissertations

Knowledge transferred during meetings is often ephemeral in nature and thus must be captured if it is to be retained. Ideally, a capture solution should be able to 1) accommodate any number of screens without sacrificing image quality and 2) allow dynamic access to a complete media capture while the capture is taking place. Both students and employees can benefit from the information captured during the lectures and meetings for enhanced discussion and afterward for knowledge retention. Current systems do not support multiple screen capture well, and no system supports dynamic access to the active meeting capture during the meeting. …


Advanced Topics On State Complexity Of Combined Operations, Yuan Gao Dec 2010

Advanced Topics On State Complexity Of Combined Operations, Yuan Gao

Electronic Thesis and Dissertation Repository

State complexity is a fundamental topic in formal languages and automata theory. The study of state complexity is also strongly motivated by applications of finite automata in software engineering, programming languages, natural language and speech processing and other practical areas. Since many of these applications use automata of large sizes, it is important to know the number of states of the automata. In this thesis, we firstly discuss the state complexities of individual operations on regular languages, including union, intersection, star, catenation, reversal and so on. The state complexity of an operation on unary languages is usually different from that …


Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens Dec 2010

Evaluation Real-Time Data Warehousing Challenges From A Theoretical And Practical Perspective, Dale Hargens

Regis University Student Publications (comprehensive collection)

The concept of real-time data warehousing has grown in popularity in recent years as organizations demand access to critical pieces of data in real-time to produce analytics and make business decisions to gain competitive advantage. Real-time data warehousing systems differ substantially from traditional data warehousing systems, thus, presenting a unique set of organizational and operational challenges. The basis for the research was to investigate whether adequate information is available regarding the organizational and operational challenges of real-time data warehousing and whether that information is available to the database community. This exploration was done by gathering primary research, conducting a case …


Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu Dec 2010

Dynamic Data Driven Application System For Wildfire Spread Simulation, Feng Gu

Computer Science Dissertations

Wildfires have significant impact on both ecosystems and human society. To effectively manage wildfires, simulation models are used to study and predict wildfire spread. The accuracy of wildfire spread simulations depends on many factors, including GIS data, fuel data, weather data, and high-fidelity wildfire behavior models. Unfortunately, due to the dynamic and complex nature of wildfire, it is impractical to obtain all these data with no error. Therefore, predictions from the simulation model will be different from what it is in a real wildfire. Without assimilating data from the real wildfire and dynamically adjusting the simulation, the difference between the …


A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu Dec 2010

A Framework For Group Modeling In Agent-Based Pedestrian Crowd Simulations, Fasheng Qiu

Computer Science Dissertations

Pedestrian crowd simulation explores crowd behaviors in virtual environments. It is extensively studied in many areas, such as safety and civil engineering, transportation, social science, entertainment industry and so on. As a common phenomenon in pedestrian crowds, grouping can play important roles in crowd behaviors. To achieve more realistic simulations, it is important to support group modeling in crowd behaviors. Nevertheless, group modeling is still an open and challenging problem. The influence of groups on the dynamics of crowd movement has not been incorporated into most existing crowd models because of the complexity nature of social groups. This research develops …


Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja Dec 2010

Web-Based Ide To Create Model And Controller Components For Mvc-Based Web Applications On Cakephp, Sugiharto Widjaja

Master's Projects

A Web-based IDE that allows users to easily manage Model and Controller components of a CakePHP web application was developed. With this IDE, users are able to manage the model and controller components without having to write very much PHP code. They are able to create new model components without having to worry about creating the database tables for the models as the IDE creates them automatically. The IDE offers a simple interface for users to edit the schema of their models. Users can add or delete data from their models without dealing with the SQL insert/delete statements. The IDE …


Trusted Mobile Overlays, Robert Scott Robertson Dec 2010

Trusted Mobile Overlays, Robert Scott Robertson

Theses and Dissertations

Sensitive information is increasingly moving online and as data moves further from the control of its owner, there are increased opportunities for it to fall into malicious hands. The Web is comprised of three untrusted components where there is a risk of information compromise: networks, service providers, and clients. This thesis presents Trusted Mobile Overlays: a system that leverages trusted mobile devices to protect users from these untrusted components of the Web, while minimizing deployment difficulties. It presents a high-level design of the system as well as a prototype that implements the design.


Preventing Computer Identity Theft, Donald R. Mcdaniel Dec 2010

Preventing Computer Identity Theft, Donald R. Mcdaniel

Regis University Student Publications (comprehensive collection)

The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic.


Asynchronous Database Drivers, Michael Adam Heath Dec 2010

Asynchronous Database Drivers, Michael Adam Heath

Theses and Dissertations

Existing database drivers use blocking socket I/O to exchange data with relational database management systems (RDBMS). To concurrently send multiple requests to a RDBMS with blocking database drivers, a separate thread must be used for each request. This approach has been used successfully for many years. However, we propose that using non-blocking socket I/O is faster and scales better under load. In this paper we introduce the Asynchronous Database Connectivity in Java (ADBCJ) framework. ADBCJ provides a common API for asynchronous RDBMS interaction. Various implementations of the ADBCJ API are used to show how utilizing non-blocking socket I/O is faster …


Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan Dec 2010

Gene Network Inference And Expression Prediction Using Recurrent Neural Networks And Evolutionary Algorithms, Heather Y. Chan

Theses and Dissertations

We demonstrate the success of recurrent neural networks in gene network inference and expression prediction using a hybrid of particle swarm optimization and differential evolution to overcome the classic obstacle of local minima in training recurrent neural networks. We also provide an improved validation framework for the evaluation of genetic network modeling systems that will result in better generalization and long-term prediction capability. Success in the modeling of gene regulation and prediction of gene expression will lead to more rapid discovery and development of therapeutic medicine, earlier diagnosis and treatment of adverse conditions, and vast advancements in life science research.


Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall Dec 2010

Test-Driven Web Application Development: Increasing The Quality Of Web Development By Providing Framework With An Emphasis On Test-Driven Design And Development Methodologies, Jason Hall

Regis University Student Publications (comprehensive collection)

Web applications , especially those based on interpreted programming languages , are quickly becoming more utilized and more commonplace than traditional client applications. Despite this growth, no open solution has yet fulfilled the need of a risk-reducing development framework that supports test-driven methodologies and tools designed to coordinate the resources responsible for the most effective development of web applications based on interpreted programming languages. This research paper presents a test-driven development framework consisting of openly available components that can be used by development teams writing web applications based on interpreted programming languages based on the methodologies and tools used by …


Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse Dec 2010

Drop-In Concurrent Api Replacement For Exploration, Test, And Debug, Everett Allen Morse

Theses and Dissertations

Complex concurrent APIs are difficult to reason about annually due to the exponential growth in the number of feasible schedules. Testing against reference solutions of these APIs is equally difficult as reference solutions implement an unknown set of allowed behaviors, and programmers have no way to directly control schedules or API internals to expose or reproduce errors. The work in this paper mechanically generates a drop-in replacement for a concurrent API from a formal specification. The specification is a guarded command system with first-order logic that is compiled into a core calculus. The term rewriting system is connected to actual …


A Type Analysis Of Rewrite Strategies, Azamat Mametjanov Dec 2010

A Type Analysis Of Rewrite Strategies, Azamat Mametjanov

Student Work

Rewrite strategies provide an algorithmic rewriting of terms using strategic compositions of rewrite rules. Due to the programmability of rewrites, errors are often made due to incorrect compositions of rewrites or incorrect application of rewrites to a term within a strategic rewriting program. In practical applications of strategic rewriting, testing and debugging becomes substantially time-intensive for large programs applied to large inputs derived from large term grammars. In essence, determining which rewrite in what position in a term did or did not re comes down to logging, tracing and/or di -like comparison of inputs to outputs. In this thesis, we …


A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy Dec 2010

A Visual Approach To Automated Text Mining And Knowledge Discovery, Andrey A. Puretskiy

Doctoral Dissertations

The focus of this dissertation has been on improving the non-negative tensor factorization technique of text mining. The improvements have been made in both pre-processing and post-processing stages, with the goal of making the non-negative tensor factorization algorithm accessible to the casual user. The improved implementation allows the user to construct and modify the contents of the tensor, experiment with relative term weights and trust measures, and experiment with the total number of algorithm output features. Non-negative tensor factorization output feature production is closely integrated with a visual post-processing tool, FutureLens, that allows the user to perform in depth analysis …


Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti Dec 2010

Self-Stabilizing Leader Election In Dynamic Networks, Hema Piniganti

UNLV Theses, Dissertations, Professional Papers, and Capstones

The leader election problem is one of the fundamental problems in distributed computing. It has applications in almost every domain. In dynamic networks, topology is expected to change frequently. An algorithm A is self-stabilizing if, starting from a completely arbitrary configuration, the network will eventually reach a legitimate configuration.

Note that any self-stabilizing algorithm for the leader election problem is also an algorithm for the dynamic leader election problem, since when the topology of the network changes, we can consider that the algorithm is starting over again from an arbitrary state. There are a number of such algorithms in the …


A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im Dec 2010

A Reasoning Framework For Dependability In Software Architectures, Tacksoo Im

All Dissertations

The degree to which a software system possesses specified levels of software quality attributes, such as performance and modifiability, often have more influence on the success and failure of those systems than the functional requirements. One method of improving the level of a software quality that a product possesses is to reason about the structure of the software architecture in terms of how well the structure supports the quality. This is accomplished by reasoning through software quality attribute scenarios while designing the software architecture of the system.
As society relies more heavily on software systems, the dependability of those systems …


Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im Dec 2010

Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im

All Dissertations

The explicit design of the architecture for a software product is a well established part of development projects. As the software architecture descriptions are becoming larger and more complex, there is more likelihood of defects being present in the software architecture. Studies have shown that a defect in the software architecture that has propagated to the development phase is very expensive to fix. To prevent such propagation of defects, this research proposes to provide debugging support for software architecture design.
Debugging is commonly used in programming languages to effectively find the cause of a failure and locate the error to …


Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein Dec 2010

Learning-Based Fusion For Data Deduplication: A Robust And Automated Solution, Jared Dinerstein

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

This thesis presents two deduplication techniques that overcome the following critical and long-standing weaknesses of rule-based deduplication: (1) traditional rule-based deduplication requires significant manual tuning of the individual rules, including the selection of appropriate thresholds; (2) the accuracy of rule-based deduplication degrades when there are missing data values, significantly reducing the efficacy of the expert-defined deduplication rules.

The first technique is a novel rule-level match-score fusion algorithm that employs kernel-machine-based learning to discover the decision threshold for the overall system automatically. The second is a novel clue-level match-score fusion algorithm that addresses both Problem 1 and 2. This unique solution …


A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones Dec 2010

A Framework For Virtual Device Driver Development And Virtual Device-Based Performance Modeling, Zachary Jones

All Dissertations

Operating system virtualization tools such as VMWare, XEN, and Linux KVM export only minimally capable SVGA graphics adapters. This paper describes the design and implementation of system
that virtualizes high-performance graphics cards of arbitrary design to support the construction of authentic device drivers. Drivers written for the virtual cards can be used verbatim, without special function calls or kernel modifications, as drivers for real cards, should real cards of the same design exist. While this allows for arbitrary design, it is not able to model performance characteristics. We describe a new kernel system that allows for arbitrarily changing the performance …


Evolutionary Strategies For Data Mining, Rose Lowe Dec 2010

Evolutionary Strategies For Data Mining, Rose Lowe

All Dissertations

Learning classifier systems (LCS) have been successful in generating rules for solving classification problems in data mining. The rules are of the form IF condition THEN action. The condition encodes the features of the input space and the action encodes the class label. What is lacking in those systems is the ability to express each feature using a function that is appropriate for that feature. The genetic algorithm is capable of doing this but cannot because only one type of membership function
is provided. Thus, the genetic algorithm learns only the shape and placement of the membership function, and in …


Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung Dec 2010

Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung

Master's Projects

False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.

With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.

Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …


An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna Dec 2010

An Online Versions Of Hyperlinked-Induced Topics Search (Hits) Algorithm, Amith Kollam Chandranna

Master's Projects

Generally, search engines perform the ranking of web pages in an offline mode, which is after the web pages have been retrieved and stored in the database. The existing HITS algorithm (Kleinberg, 1996) operates in an offline mode to perform page rank calculation. In this project, we have implemented an online mode of page ranking for this algorithm. This will improve the overall performance of the Search Engine. This report describes the approach used to implement and test this algorithm. Comparison results performed against other existing search engines are also presented in this report. This is helpful in describing the …


Japanese Kanji Suggestion Tool, Sujata Dongre Dec 2010

Japanese Kanji Suggestion Tool, Sujata Dongre

Master's Projects

Many times, we can see that if we enter a misspelled search term in any of the search engines like Google, it will provide some help with "Did you mean:...." In my project, I am providing some suggestions for the wrong Japanese text entered by a user.

The Japanese language has three types of writing styles - hiragana, katakana and the most difficult, kanji. A single kanji symbol may be used to write one or more different compound words. From the point of view of the reader, kanji symbols are said to have one or more different "readings." Hence, sometimes …


View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna Dec 2010

View Component Of Web-Based Ide To Develop Web Applications In Cakephp, Swathi Vegesna

Master's Projects

The aim of the project is to build a Web-based IDE (Integrated Development Environment) that enables users to create a Web application in PHP on the CakePHP framework. The view component of the IDE allows the users to build the CakePHP view templates, which include the HTML tags which can be properly linked with the controller functions. Users will be able to create the HTML form elements only by performing certain drags, drops and clicks. This project will create dynamic view elements, which is achieved by connecting them to the Controllers components. This IDE helps the users to create dynamic …


One Social, Sowmya Sampath Dec 2010

One Social, Sowmya Sampath

Master's Projects

Facebook streams and Twitter tweets represent user content in two common social media systems. Users often have accounts on both these systems and to keep their content current for both of them they must update each separately. It is thus difficult to manage and maintain both of these social networks together. The goal of this project is to build a social website called One Social, where users can view their Facebook streams and Twitter tweets in one single view and thereby easily organize and maintain their updates. In One Social, users can enter a status message and can share it …


Approximate Disassembly Using Dynamic Programming, Abhishek Shah Dec 2010

Approximate Disassembly Using Dynamic Programming, Abhishek Shah

Master's Projects

Most commercial anti-virus software uses signature based techniques to detect whether a file is infected by a virus or not. However, signature based detection systems are unable to detect metamorphic viruses, since such viruses change their internal structure from generation to generation. Previous work has shown that hidden Markov models (HMMs) can be used to detect metamorphic viruses. In this technique, the code is disassembled and the resulting opcode sequences are used for training and detection. Due to the disassembly step, this process is not efficient enough to use when a decision has to be made in real time.

In …


A Study On Masquerade Detection, Lin Huang Dec 2010

A Study On Masquerade Detection, Lin Huang

Master's Projects

In modern computer systems, usernames and passwords have been by far the most common forms of authentication. A security system relying only on password protection is defenseless when the passwords of legitimate users are compromised. A masquerader can impersonate a legitimate user by using a compromised password.

An intrusion detection system (IDS) can provide an additional level of protection for a security system by inspecting user behavior. In terms of detection techniques, there are two types of IDSs: signature-based detection and anomaly-based detection. An anomaly-based intrusion detection technique consists of two steps: 1) creating a normal behavior model for legitimate …


Web-Based Ide For Interfacing View Controller, Tejasvi Palvai Dec 2010

Web-Based Ide For Interfacing View Controller, Tejasvi Palvai

Master's Projects

The main idea of this project is to develop a web-based IDE, which helps users to avoid installing or configuring the Desktop IDE. It also enables users to create XHTML pages using the drag and drop mechanism in Struts. Struts extends the Java Servlet API to encourage developers to adopt the MVC (Model-View- Controller) architecture. In this project, a web application for interfacing the view and controller parts of the MVC architecture was developed. This web-based IDE connects the View and Controller components when the user drags and drops HTML elements in the UI of the IDE. With this project, …