Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman Dec 2012

Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman

Masters Theses

Extremization of a weak form for the continuum energy conservation principle differential equation naturally implements fluid convection and radiation as flux Robin boundary conditions associated with unsteady heat transfer. Combining a spatial semi-discretization via finite element trial space basis functions with time-accurate integration generates a totally node-based algebraic statement for computing. Closure for gray body radiation is a newly derived node-based radiosity formulation generating piecewise discontinuous solutions, while that for natural-forced-mixed convection heat transfer is extracted from the literature. Algorithm performance, mathematically predicted by asymptotic convergence theory, is subsequently validated with data obtained in 24 hour diurnal field experiments for …


Privacy And Security Issues In Iot Healthcare Applications For The Disabled Users A Survey, Wassnaa Al-Mawee Dec 2012

Privacy And Security Issues In Iot Healthcare Applications For The Disabled Users A Survey, Wassnaa Al-Mawee

Masters Theses

Aging of the population resulted in new challenges for the society and healthcare systems. Ambient Assisted Living (AAL) that depends on Internet of Things (IoT) provides assistance to the disabled people and supports their vital daily life activities. Affordability of and accessibility to AAL and the usage of IoT starts revolutionizing healthcare services. This Thesis is a survey of the privacy and security issues in IoT healthcare applications for the disabled users. Introduction includes definitions of privacy and security terms, and discusses their relationship. Then, it presents an overview of the IoT, including its architecture and components. Next, the Thesis …


Power Management For Cloud-Scale Data Centers, Yanwei Zhang Dec 2012

Power Management For Cloud-Scale Data Centers, Yanwei Zhang

Masters Theses

Recent years have seen the rapid growth of large and geographically distributed data centers deployed by Internet service operators to support various services such as cloud computing. Consequently, high electricity bills, as well as negative environmental implications (e.g., CO2 emission and global warming) come along. In this thesis, we first propose a novel electricity bill capping algorithm that not only minimizes the electricity cost, but also enforces a cost budget on the monthly bill for cloud-scale data centers that impact the power markets. Our solution first explicitly models the impacts of the power demands induced by cloud-scale data centers on …


Real-Time Mobile Stereo Vision, Bryan Hale Bodkin Aug 2012

Real-Time Mobile Stereo Vision, Bryan Hale Bodkin

Masters Theses

Computer stereo vision is used extract depth information from two aligned cameras and there are a number of hardware and software solutions to solve the stereo correspondence problem. However few solutions are available for inexpensive mobile platforms where power and hardware are major limitations. This Thesis will proposes a method that competes with an existing OpenCV stereo correspondence method in speed and quality, and is able to run on generic multi core CPU’s.


Robust Evolutionary Algorithms, Brian Wesley Goldman Jan 2012

Robust Evolutionary Algorithms, Brian Wesley Goldman

Masters Theses

"Evolutionary Algorithms (EAs) have shown great potential to solve complex real world problems, but their dependence on problem specific configuration in order to obtain high quality performance prevents EAs from achieving widespread use. While it is widely accepted that statically configuring an EA is already a complex problem, dynamic configuration of an EA is a combinatorially harder problem. Evidence provided here supports the claim that EAs achieve the best results when using dynamic configurations. By designing methods that automatically configure parts of an EA or by changing how EAs work to avoid configurable aspects, EAs can be made more robust, …


Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar Jan 2012

Distributed And Collaborative Watermarking In Relational Data, Prakash Kumar

Masters Theses

"Watermarking relational data is an important topic in the field of copyright protection, given the increasing prevalence of piracy and illegal duplication of databases. While there exists solutions for watermarking relational data, the problems that arise due to multiple ownership (two or more) of databases have not been acknowledged. This research focuses on developing a novel watermarking scheme to counter the problems. The watermarking scheme proposed necessitates the owners of the database in consideration to come together to perform the watermarking process. The scheme can be applied to insert watermarks in both numerical and categorical data. The watermarking scheme is …


Semantic Preserving Text Tepresentation And Its Applications In Text Clustering, Michael Howard Jan 2012

Semantic Preserving Text Tepresentation And Its Applications In Text Clustering, Michael Howard

Masters Theses

Text mining using the vector space representation has proven to be an valuable tool for classification, prediction, information retrieval and extraction. The nature of text data presents several issues to these tasks, including large dimension and the existence of special polysemous and synonymous words. A variety of techniques have been devised to overcome these shortcomings, including feature selection and word sense disambiguation. Privacy preserving data mining is also an area of emerging interest. Existing techniques for privacy preserving data mining require the use of secure computation protocols, which often incur a greatly increased computational cost. In this paper, a generalization-based …


Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi Jan 2012

Under Pressure: A Psychophysiological Analysis Of The Effect Of Temporal Constraints On Information Processing And Decision Making, Nagaratna Krishna Sneha Pochinapeddi

Masters Theses

"In recent times, decision making under time pressure has become more common than ever and hence, it has become a hot topic for behavioral researchers. This research studies the effects of temporal constraints on users' decision quality and decision strategy. The paper primarily addresses two research questions: (i) Does time pressure affect decision quality? (ii) Does time pressure affect decision strategy? The decision accuracy and decision strategy of the participants were measured for three time-pressure conditions namely, No time pressure, Reasonable time pressure and Extreme time pressure. Research results from the past revealed that, Cognitive style is also observed to …


How Should Plastic-Packaging Companies Apply Artificial Proofs And Topics Of Invention To Communicate Sustainability? : A Heuristic Developed On The Basis Of Rhetorical Analysis, Shristy Bashyal Jan 2012

How Should Plastic-Packaging Companies Apply Artificial Proofs And Topics Of Invention To Communicate Sustainability? : A Heuristic Developed On The Basis Of Rhetorical Analysis, Shristy Bashyal

Masters Theses

"This study examines how the ten plastic-packaging companies use artificial proofs and topics of invention to communicate sustainability-related information. The objective of this study was to answer the following research questions:

(i) Do plastic-packaging companies define sustainability on their website?

(ii) What are the strengths and weaknesses of the arguments in these companies' sustainability-related communications?

(iii) What invention strategies should technical marketing communicators use to communicate company's sustainable practices?

To answer these questions, I analyzed the sustainability-related documents available on the websites of the ten companies. On the basis of this analysis, I developed an invention heuristic that can be …


Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser Jan 2012

Vehicle Path Verification Using Wireless Sensor Networks, Gerry W. Howser

Masters Theses

"Path Verification is a problem where a verifier would like to determine how closely a vehicle actually traversed a path that it claims to have traversed. This problem has critical significances in terms of vehicle mobility. Mobile nodes can be patrols officers or cab drivers, while respective verifiers can be police dispatchers or cab operators. In this paper, we design a sensor network assisted technique for vehicle path verification. In our design, a number of static wireless sensors placed in road segments will serve as witnesses and certify vehicles as they move. Post movement, these witness certificates will be utilized …