Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

2011

Institution
Keyword
Publication

Articles 1 - 30 of 466

Full-Text Articles in Engineering

Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong Dec 2011

Reducing Data Loss And Saving Money By Acquiring Data Loss Prevention Software, Patarika Tipwong

Technical Reports

Choosing and implementing the right security software tools can protect a company’s assets. In particular, data breaches might not happen if a company is aware of its information flow and has the proper tool to protect it. This thesis paper will explain why and how acquiring data loss prevention (DLP) software will help a company to reduce data loss, mitigate the loss impact and save money. Facts and examples are provided to support and illustrate the statement above.


Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey Dec 2011

Detection Of Diffuse Sea Floor Venting Using Structured Light Imaging, Gabrielle Inglis, Clara Smart, Christopher Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Efficiently identifying and localizing diffuse sea floor venting at hydrothermal and cold seep sites is often difficult. Actively venting fluids are usually identified by a temperature induced optical shimmering seen during direct visual inspections or in video data collected by vehicles working close to the sea floor. Relying on such direct methods complicates establishing spatial relations between areas within a survey covering a broad area. Our recent work with a structured light laser system has shown that venting can also be detected in the image data in an automated fashion. A structured light laser system consists of a camera and …


Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey Dec 2011

Remote Analysis Of Grain Size Characteristic In Submarine Pyroclastic Deposits From Kolumbo Volcano, Greece, Clara Smart, D. P. Whitesell, Christopher N. Roman, Steven Carey

Graduate School of Oceanography Faculty Publications

Grain size characteristics of pyroclastic deposits provide valuable information about source eruption energetics and depositional processes. Maximum size and sorting are often used to discriminate between fallout and sediment gravity flow processes during explosive eruptions. In the submarine environment the collection of such data in thick pyroclastic sequences is extremely challenging and potentially time consuming. A method has been developed to extract grain size information from stereo images collected by a remotely operated vehicle (ROV). In the summer of 2010 the ROV Hercules collected a suite of stereo images from a thick pumice sequence in the caldera walls of Kolumbo …


A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo Dec 2011

A Study Of Correlations Between The Definition And Application Of The Gene Ontology, Yuji Mo

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

When using the Gene Ontology (GO), nucleotide and amino acid sequences are annotated by terms in a structured and controlled vocabulary organized into relational graphs. The usage of the vocabulary (GO terms) in the annotation of these sequences may diverge from the relations defined in the ontology. We measure the consistency of the use of GO terms by comparing GO's defined structure to the terms' application. To do this, we first use synthetic data with different characteristics to understand how these characteristics influence the correlation values determined by various similarity measures. Using these results as a baseline, we found that …


Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang Dec 2011

Building Effective Ontology For Semantic Web: A Discussion Based On Practical Examples, Tianmu Zhang

School of Information Sciences -- Faculty Publications and Other Works

The study aims to investigate semantic web and create useful ontology as a teaching and educational tool for others interested in learning more about Semantic web. This paper discussed several emerging issues about the semantic web and ontology building. This paper combines ontology implementation examples with research topics to identify current issues and potential solution in both application and theoretical level. It concludes that although semantic web and ontology technology are not mature enough currently, there is a clear tendency for them to be integrated into various applications to exert synergies.


In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich Dec 2011

In The Beginning Was The Word, And The Word Was Fuzzy, Vladik Kreinovich

Departmental Technical Reports (CS)

No abstract provided.


Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich Dec 2011

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification, Jaime Nava, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

It is well known that an arbitrary continuous function on a bounded set -- e.g., on an interval [a,b] -- can be, with any given accuracy, approximated by a polynomial. Usually, polynomials are described as linear combinations of monomials. It turns out that in many computational problems, it is more efficient to represent a polynomial as Bernstein polynomials -- e.g., for functions of one variable, a linear combination of terms (x-a)k * (b-x)n-k. In this paper, we provide a simple fuzzy-based explanation of why Bernstein polynomials are often more efficient, and we show how this informal explanation …


Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich Dec 2011

Constraint Optimization: From Efficient Computation Of What Can Be Achieved To Efficient Computation Of A Way To Achieve The Corresponding Optimum, Ali Jalal-Kamali, Martine Ceberio, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practically useful cases, we know how to efficiently compute the exact range of a function over given intervals (and, possibly, under additional constraints). In other words, we know how to efficiently compute the minimum and maximum of a given function f(x1, ..., xn) on any box. From the practical viewpoint, it is important not only to find the value of the corresponding maximum or minimum, but also to know for what values of the parameters xi this optimum is attained. We prove a general result: that if we can efficiently compute the optimum, …


Semi-Heuristic Poverty Measures Used By Economists: Justification Motivated By Fuzzy Techniques, Karen Villaverde, Nagwa Albehery, Tonghui Wang, Vladik Kreinovich Dec 2011

Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich Dec 2011

Assessment Of Functional Impairment In Human Locomotion: A Fuzzy-Motivated Approach, Murad Alaqtash, Thompson Sarkodie-Gyan, Vladik Kreinovich

Departmental Technical Reports (CS)

Many neurological disorders result in disordered motion. The effects of a disorder can be decrease by an appropriate rehabilitation. To make rehabilitation efficient, we need to monitor the patient and check how well he or she improves. In our previous papers, we proposed a fuzzy-based semi-heuristic method of gauging how well a patient improved. Surprisingly, this semi-heuristic method turned out to be more efficient that we expected. In this paper, we provide a justification for this efficiency.

In the future, it is desirable to combine this fuzzy-assessment approach with results by Alavarez-Alvarez, Trivino, and Cordon who use fuzzy techniques …


Efficient Approximation For Security Games With Interval Uncertainty, Chris Kiekintveld, Vladik Kreinovich Dec 2011

Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang Dec 2011

Stability And Classification Performance Of Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar, Qianhui Liang

Computer Science Faculty Publications

Feature selection techniques can be evaluated based on either model performance or the stability (robustness) of the technique. The ideal situation is to choose a feature selec- tion technique that is robust to change, while also ensuring that models built with the selected features perform well. One domain where feature selection is especially important is software defect prediction, where large numbers of met- rics collected from previous software projects are used to help engineers focus their efforts on the most faulty mod- ules. This study presents a comprehensive empirical ex- amination of seven filter-based feature ranking techniques (rankers) applied to …


Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez Dec 2011

Fast Super-Resolution With Affine Motion Using An Adaptive Wiener Filter And Its Application To Airborne Imaging, Russell C. Hardie, Kenneth J. Barnard, Raúl Ordóñez

Electrical and Computer Engineering Faculty Publications

Fast nonuniform interpolation based super-resolution (SR) has traditionally been limited to applications with translational interframe motion. This is in part because such methods are based on an underlying assumption that the warping and blurring components in the observation model commute. For translational motion this is the case, but it is not true in general. This presents a problem for applications such as airborne imaging where translation may be insufficient. Here we present a new Fourier domain analysis to show that, for many image systems, an affine warping model with limited zoom and shear approximately commutes with the point spread function …


Relational Neighborhood Inverse Consistency For Constraint Satisfaction: A Structure-Based Approach For Adjusting Consistency & Managing Propagation, Robert J. Woodward Dec 2011

Relational Neighborhood Inverse Consistency For Constraint Satisfaction: A Structure-Based Approach For Adjusting Consistency & Managing Propagation, Robert J. Woodward

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Freuder and Elfe [1996] introduced Neighborhood Inverse Consistency (NIC) as a local consistency property defined on the values in the variables' domains of a Constraint Satisfaction Problem (CSP). Debruyne and Bessiere [2011] showed that enforcing NIC on binary CSPs is ineffective on sparse graph and too costly on dense graphs. In this thesis, we propose Relational Neighborhood Inverse Consistency (RNIC), an extension of NIC defined as a local consistency property on the tuples of the relations of a CSP. We characterize RNIC for both binary and non-binary CSPs, and propose an algorithm for enforcing it whose complexity is bounded by …


A General Attack Method For Steganography Removal Using Pseudo-Cfa Re-Interpolation, Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif Dec 2011

A General Attack Method For Steganography Removal Using Pseudo-Cfa Re-Interpolation, Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif

Department of Electrical and Computer Engineering: Faculty Publications (to 2015)

Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar …


Concept Tests For A New Wire Flying Vehicle Designed To Achieve High Horizontal Resolution Profiling In Deep Water, Chris Roman, Dave Hebert Dec 2011

Concept Tests For A New Wire Flying Vehicle Designed To Achieve High Horizontal Resolution Profiling In Deep Water, Chris Roman, Dave Hebert

Graduate School of Oceanography Faculty Publications

Efficiently profiling the water column to achieve both high vertical and horizontal resolution from a moving vessel in deep water is difficult. Current solutions, such as CTD tow-yos, moving vessel profilers, and undulating tow bodies, are limited by ship speed or water depth. As a consequence, it is difficult to obtain oceanographic sections with sufficient resolution to identify many relevant scales over the deeper sections of the water column. This paper presents a new concept for a profiling vehicle that slides up and down a towed wire in a controlled manner using the lift created by wing foils. The wings …


Location Cheating: A Security Challenge To Location-Based Social Network Services, Mai Ren Dec 2011

Location Cheating: A Security Challenge To Location-Based Social Network Services, Mai Ren

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Location-based mobile social network services such as Foursquare and Gowalla have grown exponentially over the past several years. These location-based services utilize the geographical position to enrich user experiences in a variety of contexts, including location-based searching and location-based mobile advertising. To attract more users, the location-based mobile social network services provide real-world rewards to the user, when a user checks in at a certain venue or location. This gives incentives for users to cheat on their locations.

In this thesis, we investigate the threat of location cheating attacks, find the root cause of the vulnerability, and outline the possible …


A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp Dec 2011

A Novel Telecommunications-Based Approach To Mathematical Modeling Of Hiv Infection, Aaron T. Sharp

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

It is well known that biological systems utilize communication in some form, one prolific example of this is the propagation of HIV (Human Immunodeficiency Virus) in the human body. By modeling HIV infection as a communication system, we hope to gain a unique insight into HIV and biological communication systems in general. Such a model would provide researchers a platform for experimenting and simulating various biological communication systems. We have previously developed a layered communication protocol for interpreting biological communication systems using telecommunications paradigms and will apply said model to HIV proliferation. We will also demonstrate the effectiveness of the …


Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li Dec 2011

Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li

Research Collection School Of Computing and Information Systems

Despite the massive growth of web-shared videos in Internet, efficient organization and monitoring of videos remains a practical challenge. While nowadays broadcasting channels are keen to monitor online events, identifying topics of interest from huge volume of user uploaded videos and giving recommendation to emerging topics are by no means easy. Specifically, such process involves discovering of new topic, visualization of the topic content, and incremental monitoring of topic evolution. This paper studies the problem from three aspects. First, given a large set of videos collected over months, an efficient algorithm based on salient trajectory extraction on a topic evolution …


Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo Dec 2011

Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Most search engines return a ranked list of items in response to a query. The list however tells very little about the relationship among items. For videos especially, users often read to spend significant amount of time to navigate the search result. Exploratory search presents a new paradigm for browsing where the browser takes up the role of information exploring and presents a well-organized browsing structure for users to navigate. The proposed interface Galaxy Browser adopts the recent advances in near-duplicate detection and then synchronizes the detected near-duplicate information with comprehensive background knowledge derived from online external resources. The result …


On The Pooling Of Positive Examples With Ontology For Visual Concept Learning, Shiai Zhu, Chong-Wah Ngo, Yu-Gang Jiang Dec 2011

On The Pooling Of Positive Examples With Ontology For Visual Concept Learning, Shiai Zhu, Chong-Wah Ngo, Yu-Gang Jiang

Research Collection School Of Computing and Information Systems

A common obstacle in effective learning of visual concept classifiers is the scarcity of positive training examples due to expensive labeling cost. This paper explores the sampling of weakly tagged web images for concept learning without human assistance. In particular, ontology knowledge is incorporated for semantic pooling of positive examples from ontologically neighboring concepts. This effectively widens the coverage of the positive samples with visually more diversified content, which is important for learning a good concept classifier. We experiment with two learning strategies: aggregate and incremental. The former strategy re-trains a new classifier by combining existing and newly collected examples, …


Cross Media Hyperlinking For Search Topic Browsing, Song Tan, Chong-Wah Ngo, Hung-Khoon Tan, Lei Pang Dec 2011

Cross Media Hyperlinking For Search Topic Browsing, Song Tan, Chong-Wah Ngo, Hung-Khoon Tan, Lei Pang

Research Collection School Of Computing and Information Systems

With the rapid growth of social media, there are plenty of information sources freely available online for use. Nevertheless, how to synchronize and leverage these diverse forms of information for multimedia applications remains a problem yet to be seriously studied. This paper investigates the synchronization of multiple media content in the physical form of hyperlinking them. The ultimate goal is to develop browsing systems that author search results with rich media information mined from various knowledge sources. The authoring enables the vivid visualization and exploration of different information landscapes inherent in search results. Several key techniques are studied in this …


A Quantitative Performance Analysis Of 2.5 Ghz And 3.65 Ghz Mobile Wimax, Pradhumna L. Shrestha Nov 2011

A Quantitative Performance Analysis Of 2.5 Ghz And 3.65 Ghz Mobile Wimax, Pradhumna L. Shrestha

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Mobile WiMAX has emerged as a prime contender for the de-facto ITU’s 4G standard. It provides high data rate with large coverage and vehicular mobility support. It has been, and is being, widely deployed in diverse applications like video streaming, broadcasting and data service. The FCC (Federal Communications Commission) issues licenses to operate Mobile WiMAX services in several spectrums, among which 2.5 GHz and 3.65 GHz are the most common. Because the 2.5 GHz spectrum suffers the least propagation losses, it has been widely applied commercially. For this reason, academic and industrial researchers have given it particular attention. However, in …


Efficient Traffic Crash And Snow Complaint Gis System, Anthony B. Ngo Nov 2011

Efficient Traffic Crash And Snow Complaint Gis System, Anthony B. Ngo

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

We describe the design and implementation of a traffic crash and snow complaint GIS system developed for the Lincoln Public Works department. We also describe a novel geocoding algorithm that was used to move data from the older Criminal Justice Information System, which is a relational database, to the new GIS system. In addition, we describe the implementation of several indexing algorithms that enable the system to efficiently answer rectangular range queries and queries about the relative locations of moving objects. Finally, in many applications (on-line analysis or mobile GIS), we need to execute spatial query efficiently (fast and small), …


Constraint Problems: Computability Is Equivalent To Continuity, Martine Ceberio, Vladik Kreinovich Nov 2011

Estimating Correlation Under Interval Uncertainty, Ali Jalal-Kamali, Vladik Kreinovich Nov 2011

Estimating Correlation Under Interval Uncertainty, Ali Jalal-Kamali, Vladik Kreinovich

Departmental Technical Reports (CS)

In many engineering situations, we are interested in finding the correlation ρ between different quantities x and y based on the values xi and yi of these quantities measured in different situations i. Measurements are never absolutely accurate; it is therefore necessary to take this inaccuracy into account when estimating the correlation ρ. Sometimes, we know the probabilities of different values of measurement errors, but in many cases, we only know the upper bounds Δxi and Δyi on the corresponding measurement errors. In such situations, after we get the measurement results Xi and Yi …


Visko: Semantic Web Support For Information And Science Visualization, Nicholas Del Rio, Paulo Pinheiro Da Silva Nov 2011

Measuring Stability Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar Nov 2011

Measuring Stability Of Threshold-Based Feature Selection Techniques, Huanjing Wang, Taghi Khoshgoftaar

Computer Science Faculty Publications

Feature selection has been applied in many domains, such as text mining and software engineering. Ideally a feature selection technique should produce consistent out- puts regardless of minor variations in the input data. Re- searchers have recently begun to examine the stability (robustness) of feature selection techniques. The stability of a feature selection method is defined as the degree of agreement between its outputs to randomly-selected subsets of the same input data. This study evaluated the stability of 11 threshold-based feature ranking techniques (rankers) when applied to 16 real-world software measurement datasets of different sizes. Experimental results demonstrate that AUC …


Construction Of An Np Problem With An Exponential Lower Bound, Roman V. Yampolskiy Nov 2011

Construction Of An Np Problem With An Exponential Lower Bound, Roman V. Yampolskiy

Faculty Scholarship

In this paper we present a Hashed-Path Traveling Salesperson Problem (HPTSP), a new type of problem which has the interesting property of having no polynomial time solutions. Next we show that HPTSP is in the class NP by demonstrating that local information about sub-routes is insufficient to compute the complete value of each route. As a consequence, via Ladner"s theorem, we show that the class NPI is non-empty.


Signquote: A Remote Testing Facility For Eliciting Signed Qualitative Feedback, Jerry Schnepp, Rosalee Wolfe, Brent Shiver, John Mcdonald, Jorge Toro Oct 2011

Signquote: A Remote Testing Facility For Eliciting Signed Qualitative Feedback, Jerry Schnepp, Rosalee Wolfe, Brent Shiver, John Mcdonald, Jorge Toro

Visual Communications and Technology Education Faculty Publications

Sign synthesis is still an evolving technology and improving it requires the elicitation of qualitative feedback from users. Current options for acquiring qualitative feedback are limited. Face-toface tests conducted in sign language are expensive. On the other hand, remote tests do not use the preferred language of the test participants. A new tool, SignQUOTE, (Signed Qualitative Usability Online Testing Environment) is a configurable, cross platform remote testing system based entirely on sign language. It includes an innovative method for capturing qualitative feedback in sign language via webcam. In a comparison study, participants viewed animations of American Sign Language and gave …