Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Department of Computer Science and Engineering

2016

Articles 1 - 21 of 21

Full-Text Articles in Computer Engineering

Dynamic Level-2 Cache Memory Locking By Utilizing Multiple Miss Tables, Andrew Louis Mocniak Jan 2016

Dynamic Level-2 Cache Memory Locking By Utilizing Multiple Miss Tables, Andrew Louis Mocniak

Browse all Theses and Dissertations

Cache memory plays a vital role in a system's performance by acting as a buffer to quickly supply requested instruction/data blocks from the main memory to the central processing unit (CPU). Cache management techniques may increase or decrease a system's performance. The results vary from process to process, depending on how well optimized the cache management technique is for a particular process. The inclusion of level-2 (L2) cache locking has been shown in previous studies to be beneficial in increasing a system's performance. This is further improved upon through the inclusion of a miss table (MT), which keeps track of …


Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu Jan 2016

Computer Graphics And Visualization Based Analysis And Record System For Hand Surgery And Therapy Practice, Venkatamanikanta Subrahmanyakartheek Gokavarapu

Browse all Theses and Dissertations

In this thesis, we have designed and developed a computer graphics and visualization based analysis and record system for hand surgery and therapy practice. In particular, we have designed and developed three novel technologies: (i) model-based data compression for hand motion records (ii) model-based surface area estimation of a human hand and (iii) an emulated study of hand wound area estimation. First, we have presented a new data compression technique to better address the needs of electronic health record systems, such as file storage and privacy. In our proposed approach, we will extract the patient's hand motion information and store …


Wikimatcher: Leveraging Wikipedia For Ontology Alignment, Helena Brooke Mccurdy Jan 2016

Wikimatcher: Leveraging Wikipedia For Ontology Alignment, Helena Brooke Mccurdy

Browse all Theses and Dissertations

As the Semantic Web grows, so does the number of ontologies used to structure the data within it. Aligning these ontologies is critical to fully realizing the potential of the web. Previous work in ontology alignment has shown that even alignment systems utilizing basic string similarity metrics can produce useful matches. Researchers speculate that including semantic as well as syntactic information inherent in entity labels can further improve alignment results. This paper examines that hypothesis by exploring the utility of using Wikipedia as a source of semantic information. Various elements of Wikipedia are considered, including article content, page terms, and …


Personalized And Adaptive Semantic Information Filtering For Social Media, Pavan Kapanipathi Jan 2016

Personalized And Adaptive Semantic Information Filtering For Social Media, Pavan Kapanipathi

Browse all Theses and Dissertations

Social media has experienced immense growth in recent times. These platforms are becoming increasingly common for information seeking and consumption, and as part of its growing popularity, information overload pose a significant challenge to users. For instance, Twitter alone generates around 500 million tweets per day and it is impractical for users to have to parse through such an enormous stream to find information that are interesting to them. This situation necessitates efficient personalized filtering mechanisms for users to consume relevant, interesting information from social media. Building a personalized filtering system involves understanding users' interests and utilizing these interests to …


Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley Jan 2016

Detecting Php-Based Cross-Site Scripting Vulnerabilities Using Static Program Analysis, Steven M. Kelbley

Browse all Theses and Dissertations

With the widespread adoption of dynamic web applications in recent years, a number of threats to the security of these applications have emerged as significant challenges for application developers. The security of developed applications has become a higher priority for both developers and their employers as cyber attacks become increasingly more prevalent and damaging. Some of the most used web application frameworks are written in PHP and have become major targets due to the large number of servers running these applications worldwide. A number of tools exist to evaluate PHP code for issues, however most of these applications are not …


Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne Jan 2016

Measures Of User Interactions, Conversations, And Attacks In A Crowdsourced Platform Offering Emotional Support., Samir Yelne

Browse all Theses and Dissertations

Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how and when users utilize these systems, and to evaluate their safety, this thesis offers a comprehensive examination of the characteristics …


Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen Jan 2016

Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen

Browse all Theses and Dissertations

Web 2.0 and social media enable people to create, share and discover information instantly anywhere, anytime. A great amount of this information is subjective information -- the information about people's subjective experiences, ranging from feelings of what is happening in our daily lives to opinions on a wide variety of topics. Subjective information is useful to individuals, businesses, and government agencies to support decision making in areas such as product purchase, marketing strategy, and policy making. However, much useful subjective information is buried in ever-growing user generated data on social media platforms, it is still difficult to extract high quality …


Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera Jan 2016

Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera

Browse all Theses and Dissertations

Natural language is a powerful tool developed by humans over hundreds of thousands of years. The extensive usage, flexibility of the language, creativity of the human beings, and social, cultural, and economic changes that have taken place in daily life have added new constructs, styles, and features to the language. One such feature of the language is its ability to express ideas, opinions, and facts in an implicit manner. This is a feature that is used extensively in day to day communications in situations such as: 1) expressing sarcasm, 2) when trying to recall forgotten things, 3) when required to …


Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel Jan 2016

Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel

Browse all Theses and Dissertations

In this thesis, we have designed and developed a motion tracking and visualization system using the latest motion tracking sensory technologies. It is one of the enabling technologies for our novel visual-inertial odometer and human anatomy based 3D Locating, Mapping and Navigation system for endoscopy and drug delivery capsules used inside GI tract. In particular, we have: i) designed and completed a cloud-based sensory data collecting, processing and storage system to provide the reliable computing and storage platform; ii) explored different data processing methods to obtain improved-quality motion results from extremely noisy raw data, e.g., by using a low pass …


Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman Jan 2016

Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman

Browse all Theses and Dissertations

New educational pedagogies are emerging in an effort to increase the number of new engineers available to enter the workforce in the coming years. One of the re-occurring themes in these pedagogies is variations of the flipped classroom. Often the additional classroom time gained from flipping is used to reinforce learning objectives. It is hypothesized that it might be more beneficial to students if a portion of that time is used to address common non-cognitive barriers that prevent students from succeeding in the major. In a freshman Introductory Computer Science course, three different pedagogies are compared: a hybrid lecture-active learning …


De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle Jan 2016

De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle

Browse all Theses and Dissertations

Data generalization (anonymization) is a widely misunderstood technique for preserving individual privacy in non-interactive data publishing. Easily avoidable anonymization failures are still occurring 14 years after the discovery of basic techniques to protect against them. Identities of individuals in anonymized datasets are at risk of being disclosed by cyber attackers who exploit these failures. To demonstrate the importance of proper data anonymization we present three perspectives on data anonymization. First, we examine several de-anonymization attacks to formalize the anatomy used to conduct attacks on anonymous data. Second, we examine the vulnerabilities of an anonymous nursing workforce survey to convey how …


A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva Jan 2016

A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva

Browse all Theses and Dissertations

Many video processing applications, such as motion detection and tracking, rely on accurate and robust alignment between consecutive video frames. Traditional approaches to video image registration, such as pyramidal Kanade-Lucas-Tomasi (KLT) feature detection and tracking are fast and subpixel accurate, but are not robust to large inter-frame displacements due to rotation, scale, or translation. This thesis presents an alternative hybrid approach using normalized gradient correlation (NGC) in the frequency domain and normalized cross-correlation (NCC) in the spatial domain that is fast, accurate, and robust to large displacements. A scale space search is incorporated into NGC to enable more consistent recovery …


Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude Jan 2016

Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude

Browse all Theses and Dissertations

With an ever increasing amount of data that is shared and posted on the Web, the desire and necessity to automatically glean this information has led to an increase in the sophistication and volume of software agents called web robots or crawlers. Recent measurements, including our own across the entire logs of Wright State University Web servers over the past two years, suggest that at least 60\% of all requests originate from robots rather than humans. Web robots display different statistical and behavioral patterns in their traffic compared to humans, yet present Web server optimizations presume that traffic exhibits predominantly …


Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla Jan 2016

Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla

Browse all Theses and Dissertations

Harassment on social media has become a critical problem and social media content depicting harassment is becoming common place. Video-sharing websites such as YouTube contain content that may be offensive to certain community, insulting to certain religion, race etc., or make fun of disabilities. These videos can also provoke and promote altercations leading to online harassment of individuals and groups. In this thesis, we present a system that identifies offensive videos on YouTube. Our goal is to determine features that can be used to detect offensive videos efficiently and reliably. We conducted experiments using content and metadata available for each …


An Autoencoder-Based Image Descriptor For Image Matching And Retrieval, Chenyang Zhao Jan 2016

An Autoencoder-Based Image Descriptor For Image Matching And Retrieval, Chenyang Zhao

Browse all Theses and Dissertations

Local image features are used in many computer vision applications. Many point detectors and descriptors have been proposed in recent years; however, creation of effective descriptors is still a topic of research. The Scale Invariant Feature Transform (SIFT) developed by David Lowe is widely used in image matching and image retrieval. SIFT detects interest points in an image based on Scale-Space analysis, which is invariant to change in image scale. A SIFT descriptor contains gradient information about an image patch centered at a point of interest. SIFT is found to provide a high matching rate, is robust to image transformations; …


Private Record Linkage: A Comparison Of Selected Techniques For Name Matching, Pawel B. Grzebala Jan 2016

Private Record Linkage: A Comparison Of Selected Techniques For Name Matching, Pawel B. Grzebala

Browse all Theses and Dissertations

The rise of Big Data Analytics has shown the utility of analyzing all aspects of a problem by bringing together disparate data sets. Efficient and accurate private record linkage algorithms are necessary to achieve this. However, records are often linked based on personally identifiable information, and protecting the privacy of individuals is critical. This work contributes to this field by studying an important component of the private record linkage problem: linking based on names while keeping those names encrypted, both on disk and in memory. We explore the applicability, accuracy, speed and security of three different primary approaches to this …


A Closed Loop Research Platform That Enables Dynamic Control Of Wing Gait Patterns In A Vertically Constrained Flapping Wing - Micro Air Vehicle, Hermanus Van Botha Jan 2016

A Closed Loop Research Platform That Enables Dynamic Control Of Wing Gait Patterns In A Vertically Constrained Flapping Wing - Micro Air Vehicle, Hermanus Van Botha

Browse all Theses and Dissertations

Research in Flapping Wing - Micro Air Vehicles(FW-MAVs) has been growing in recent years. Work ranging from mechanical designs to adaptive control algorithms are being developed in pursuit of mimicking natural flight. FW-MAV technology can be applied in a variety of use cases such a military application and surveillance, studying natural ecological systems, and hobbyist commercialization. Recent work has produced small scale FW-MAVs that are capable of hovering and maneuvering. Researchers control maneuvering in various ways, some of which involve making small adjustments to the core wing motion patterns (wing gaits) which determine how the wings flap. Adaptive control algorithms …


A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou Jan 2016

A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou

Browse all Theses and Dissertations

Natural Language Understanding (NLU) is a very old research field, which deals with machine reading comprehension. Despite the many years of work and the numerous accomplishments by several researchers in the field, there is still place for significant improvements. Here, our goal is to develop a novel NLU methodology for detecting and extracting event/action associations in technical documents. In order to achieve this goal we present a synergy of methods (Kernel extraction, Formal Language Modeling, Stochastic Petri-nets (SPN) mapping and Event Representation via SPN graph synthesis). In particular, the basic meaning of a natural language sentence is given by its …


Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf Jan 2016

Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf

Browse all Theses and Dissertations

Software defined networking (SDN), a new networking paradigm that separates the network data plane from the control plane, has been considered as a flexible, layered, modular, and efficient approach to managing and controlling networks ranging from wired, infrastructure-based wireless (e.g., cellular wireless networks, WiFi, wireless mesh net- works), to infrastructure-less wireless networks (e.g. mobile ad-hoc networks, vehicular ad-hoc networks) as well as to offering new types of services and to evolving the Internet architecture. Most work has focused on the SDN application in traditional and wired and/or infrastructure based networks. Wireless networks have become increasingly more heterogeneous. Secure and collab- …


Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam Jan 2016

Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam

Browse all Theses and Dissertations

There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world constitute a Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects …


Knowledge Driven Search Intent Mining, Ashutosh Jadhav Jan 2016

Knowledge Driven Search Intent Mining, Ashutosh Jadhav

Browse all Theses and Dissertations

Understanding users' latent intents behind search queries is essential for satisfying a user's search needs. Search intent mining can help search engines to enhance its ranking of search results, enabling new search features like instant answers, personalization, search result diversification, and the recommendation of more relevant ads. Hence, there has been increasing attention on studying how to effectively mine search intents by analyzing search engine query logs. While state-of-the-art techniques can identify the domain of the queries (e.g. sports, movies, health), identifying domain-specific intent is still an open problem. Among all the topics available on the Internet, health is one …