Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (82)
- Physical Sciences and Mathematics (48)
- Computer Sciences (44)
- Genetics and Genomics (12)
- Life Sciences (12)
-
- Digital Communications and Networking (10)
- Medicine and Health Sciences (9)
- Systems and Communications (7)
- Robotics (6)
- Computer and Systems Architecture (5)
- Other Computer Engineering (5)
- Social and Behavioral Sciences (5)
- Data Science (4)
- Hardware Systems (4)
- Mental and Social Health (4)
- Public Health (4)
- Arts and Humanities (3)
- Digital Circuits (3)
- Digital Humanities (3)
- Diseases (3)
- Psychology (3)
- Respiratory Tract Diseases (3)
- Signal Processing (3)
- Communication (2)
- Health Information Technology (2)
- Manufacturing (2)
- Mathematics (2)
- Mechanical Engineering (2)
- Keyword
-
- Computer Science and Engineering (69)
- Internet (27)
- Software agents (25)
- Engineering, Computer Science and Engineering (17)
- Computer Science and Engineering, Biology (13)
-
- Genomics (11)
- Multi-agent systems (11)
- Artificial intelligence (10)
- Deep learning (10)
- Genome (10)
- Social media (9)
- Information resources (8)
- Machine learning (8)
- AI (7)
- Natural language processing (6)
- Convolutional neural network (5)
- Electrical and Computer Engineering (5)
- Harassment (5)
- Reddit (5)
- Web (5)
- Big data (4)
- Convolutional neural networks (4)
- Cooperative systems (4)
- Depression (4)
- Fading (4)
- Field programmable gate arrays (4)
- Healthcare (4)
- Internet of Things (4)
- Twitter (4)
- Web services (4)
- Publication Year
- Publication
- Publication Type
Articles 121 - 150 of 275
Full-Text Articles in Computer Engineering
Ontology-Guided Pre-Release Inference Disruption, Mark Stephen Daniels
Ontology-Guided Pre-Release Inference Disruption, Mark Stephen Daniels
Theses and Dissertations
We investigate privacy violations occurring when non-confidential patient data is combined with medical domain ontologies to disclose a patient’s protected health information (PHI). We propose a framework that detects privacy violations and eliminates undesired inferences. Our inference channel removal process is based on controlling the release of the data items that lead to undesired inferences. These data items are either blocked from release or generalized to eliminate the disclosure of the PHI. We show that our method is sound and complete. Soundness means the only inference paths generated logically follow from released data and corresponding domain knowledge. Completeness means we …
Bytecode-Based Multiple Condition Coverage: An Initial Investigation, Srujana Bollina
Bytecode-Based Multiple Condition Coverage: An Initial Investigation, Srujana Bollina
Theses and Dissertations
Masking occurs when one condition prevents another condition from influencing the output of a Boolean expression. Logic-based adequacy criteria such as Multiple Condition Coverage (MCC) are designed to overcome masking at the within-expression level, but can offer no guarantees about masking in subsequent expressions. As a result, a Boolean expression written as a single complex statement will yield test cases that are more likely to overcome masking than when the expression is written as series of simple statements. Many approaches to automated analysis and test case generation for Java systems operate not on the source code representation of code, but …
Ms. An (Meeting Students’ Academic Needs): A Socially Adaptive Robot Tutor For Student Engagement In Math Education, Karina Liles
Ms. An (Meeting Students’ Academic Needs): A Socially Adaptive Robot Tutor For Student Engagement In Math Education, Karina Liles
Theses and Dissertations
This research presents a new, socially adaptive robot tutor, Ms. An (Meeting Students’ Academic Needs). The goal of this research was to use a decision tree model to develop a socially adaptive robot tutor that predicted and responded to student emotion and performance to actively engage students in mathematics education. The novelty of this multi-disciplinary project is the combination of the fields of HRI, AI, and education. In this study we 1) implemented a decision tree model to classify student emotion and performance for use in adaptive robot tutoring-an approach not applied to educational robotics; 2) presented an intuitive interface …
Tracking, Detection And Registration In Microscopy Material Images, Hongkai Yu
Tracking, Detection And Registration In Microscopy Material Images, Hongkai Yu
Theses and Dissertations
Fast and accurate characterization of fiber micro-structures plays a central role for material scientists to analyze physical properties of continuous fiber reinforced composite materials. In materials science, this is usually achieved by continuously crosssectioning a 3D material sample for a sequence of 2D microscopic images, followed by a fiber detection/tracking algorithm through the obtained image sequence.
To speed up this process and be able to handle larger-size material samples, we propose sparse sampling with larger inter-slice distance in cross sectioning and develop a new algorithm that can robustly track large-scale fibers from such a sparsely sampled image sequence. In particular, …
On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment, Sharaf J. Malebary
On The Security And Quality Of Wireless Communications In Outdoor Mobile Environment, Sharaf J. Malebary
Theses and Dissertations
The rapid advancement in wireless technology along with their low cost and ease of deployment have been attracting researchers academically and commercially. Researchers from private and public sectors are investing into enhancing the reliability, robustness, and security of radio frequency (RF) communications to accommodate the demand and enhance lifestyle. RF base communications -by nature- are slower and more exposed to attacks than a wired base (LAN). Deploying such networks in various cutting-edge mobile platforms (e.g. VANET, IoT, Autonomous robots) adds new challenges that impact the quality directly. Moreover, adopting such networks in public outdoor areas make them vulnerable to various …
Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Ling, Lingxi Zhou, Roufan Xia, Fei Hu, Chao Liu
Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Ling, Lingxi Zhou, Roufan Xia, Fei Hu, Chao Liu
Faculty Publications
Phylogenetic studies aim to discover evolutionary relationships and histories. These studies are based on similarities of morphological characters and molecular sequences. Currently, widely accepted phylogenetic approaches are based on multiple sequence alignments, which analyze shared gene datasets and concatenate/coalesce these results to a final phylogeny with maximum support. However, these approaches still have limitations, and often have conflicting results with each other. Reconstructing ancestral genomes helps us understand mechanisms and corresponding consequences of evolution. Most existing genome level phylogeny and ancestor reconstruction methods can only process simplified real genome datasets or simulated datasets with identical genome content, unique genome markers, …
Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Lin, Lingxi Zhou, Yan Guo, Robert Friedman, Roufan Xia, Chao Liu, Jijun Tang
Reconstructing Yeasts Phylogenies And Ancestors From Whole Genome Data, Bing Feng, Yu Lin, Lingxi Zhou, Yan Guo, Robert Friedman, Roufan Xia, Chao Liu, Jijun Tang
Faculty Publications
Phylogenetic studies aim to discover evolutionary relationships and histories. These studies are based on similarities of morphological characters and molecular sequences. Currently, widely accepted phylogenetic approaches are based on multiple sequence alignments, which analyze shared gene datasets and concatenate/coalesce these results to a final phylogeny with maximum support. However, these approaches still have limitations, and often have conflicting results with each other. Reconstructing ancestral genomes helps us understand mechanisms and corresponding consequences of evolution. Most existing genome level phylogeny and ancestor reconstruction methods can only process simplified real genome datasets or simulated datasets with identical genome content, unique genome markers, …
Modelling Human Activity Through Structural Vibrations With Alternate Computational Devices To Increase Cost Efficiency, Elaine Patterson
Modelling Human Activity Through Structural Vibrations With Alternate Computational Devices To Increase Cost Efficiency, Elaine Patterson
Journal of the South Carolina Academy of Science
Every event that occurs has a reaction, whether it be a pebble causing ripples in a pond or a bullet distressing a wall. Within a structure, these vibrations caused by a specific event in a medium can be measured with an accelerometer, and just as the vibrations caused by a bullet differ observably from those caused by a pebble, vibrations caused by walking vary from those caused by falling, running or jumping. To the eye, these differences are slight to severe, but when that signal is dissected, it is identifiably unique by its cause and location with extensive applications from …
Improving Rolling Bearing Fault Diagnosis By Ds Evidence Theory Based Fusion Model, Xuemei Yao, Shaobo Li, Jianjun Hu
Improving Rolling Bearing Fault Diagnosis By Ds Evidence Theory Based Fusion Model, Xuemei Yao, Shaobo Li, Jianjun Hu
Faculty Publications
Rolling bearing plays an important role in rotating machinery and its working condition directly affects the equipment efficiency. While dozens of methods have been proposed for real-time bearing fault diagnosis and monitoring, the fault classification accuracy of existing algorithms is still not satisfactory. This work presents a novel algorithm fusion model based on principal component analysis and Dempster-Shafer evidence theory for rolling bearing fault diagnosis. It combines the advantages of the learning vector quantization (LVQ) neural network model and the decision tree model. Experiments under three different spinning bearing speeds and two different crack sizes show that our fusion model …
Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo
Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo
Faculty Publications
Background: Phylogenetic analysis is a key way to understand current research in the biological processes and detect theory in evolution of natural selection. The evolutionary relationship between species is generally reflected in the form of phylogenetic trees. Many methods for constructing phylogenetic trees, are based on the optimization criteria. We extract the biological data via modeling features, and then compare these characteristics to study the biological evolution between species.
Results: Here, we use maximum likelihood and Bayesian inference method to establish phylogenetic trees; multi-chain Markov chain Monte Carlo sampling method can be used to select optimal phylogenetic tree, resolving local …
An Ameliorated Prediction Of Drug–Target Interactions Based On Multi-Scale Discrete Wavelet Transform And Network Features, Cong Shen, Yijie Ding, Jijun Tang, Xinying Xu, Fei Guo
An Ameliorated Prediction Of Drug–Target Interactions Based On Multi-Scale Discrete Wavelet Transform And Network Features, Cong Shen, Yijie Ding, Jijun Tang, Xinying Xu, Fei Guo
Faculty Publications
The prediction of drug–target interactions (DTIs) via computational technology plays a crucial role in reducing the experimental cost. A variety of state-of-the-art methods have been proposed to improve the accuracy of DTI predictions. In this paper, we propose a kind of drug–target interactions predictor adopting multi-scale discrete wavelet transform and network features (named as DAWN) in order to solve the DTIs prediction problem. We encode the drug molecule by a substructure fingerprint with a dictionary of substructure patterns. Simultaneously, we apply the discrete wavelet transform (DWT) to extract features from target sequences. Then, we concatenate and normalize the target, drug, …
An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guoka Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu
An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guoka Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu
Faculty Publications
Intelligent machine health monitoring and fault diagnosis are becoming increasingly important for modern manufacturing industries. Current fault diagnosis approaches mostly depend on expert-designed features for building prediction models. In this paper, we proposed IDSCNN, a novel bearing fault diagnosis algorithm based on ensemble deep convolutional neural networks and an improved Dempster–Shafer theory based evidence fusion. The convolutional neural networks take the root mean square (RMS) maps from the FFT (Fast Fourier Transformation) features of the vibration signals from two sensors as inputs. The improved D-S evidence theory is implemented via distance matrix from evidences and modified Gini Index. Extensive evaluations …
An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guokai Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu
An Ensemble Deep Convolutional Neural Network Model With Improved D-S Evidence Fusion For Bearing Fault Diagnosis, Shaobo Li, Guokai Liu, Xianghong Tang, Jianguang Lu, Jianjun Hu
Faculty Publications
Intelligent machine health monitoring and fault diagnosis are becoming increasingly important for modern manufacturing industries. Current fault diagnosis approaches mostly depend on expert-designed features for building prediction models. In this paper, we proposed IDSCNN, a novel bearing fault diagnosis algorithm based on ensemble deep convolutional neural networks and an improved Dempster–Shafer theory based evidence fusion. The convolutional neural networks take the root mean square (RMS) maps from the FFT (Fast Fourier Transformation) features of the vibration signals from two sensors as inputs. The improved D-S evidence theory is implemented via distance matrix from evidences and modified Gini Index. Extensive evaluations …
An Advanced Multi-Sensor Acousto-Ultrasonic Structural Health Monitoring System: Development And Aerospace Demonstration, Joel Smithard, Nik Rajic, Stephen Van Der Velden, Patrick Norman, Cedric Rosalie, Steve Galea, Hanfei Mei, Bin Lin, Victor Giurgiutiu
An Advanced Multi-Sensor Acousto-Ultrasonic Structural Health Monitoring System: Development And Aerospace Demonstration, Joel Smithard, Nik Rajic, Stephen Van Der Velden, Patrick Norman, Cedric Rosalie, Steve Galea, Hanfei Mei, Bin Lin, Victor Giurgiutiu
Faculty Publications
A key longstanding objective of the Structural Health Monitoring (SHM) research community is to enable the embedment of SHM systems in high value assets like aircraft to provide on-demand damage detection and evaluation. As against traditional non-destructive inspection hardware, embedded SHM systems must be compact, lightweight, low-power and sufficiently robust to survive exposure to severe in-flight operating conditions. Typical Commercial-Off-The-Shelf (COTS) systems can be bulky, costly and are often inflexible in their configuration and/or scalability, which militates against in-service deployment. Advances in electronics have resulted in ever smaller, cheaper and more reliable components that facilitate the development of compact and …
Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K Sharma
Road Accidents Bigdata Mining And Visualization Using Support Vector Machines, Usha Lokala, Srinivas Nowduri, Prabhakar K Sharma
Publications
Useful information has been extracted from the road accident data in United Kingdom (UK), using data analytics method, for avoiding possible accidents in rural and urban areas. This analysis make use of several methodologies such as data integration, support vector machines (SVM), correlation machines and multinomial goodness. The entire datasets have been imported from the traffic department of UK with due permission. The information extracted from these huge datasets forms a basis for several predictions, which in turn avoid unnecessary memory lapses. Since data is expected to grow continuously over a period of time, this work primarily proposes a new …
Analysis Of Co-Associated Transcription Factors Via Ordered Adjacency Differences On Motif Distribution, Gaofeng Pan, Jijun Tang, Fei Guo
Analysis Of Co-Associated Transcription Factors Via Ordered Adjacency Differences On Motif Distribution, Gaofeng Pan, Jijun Tang, Fei Guo
Faculty Publications
Transcription factors (TFs) binding to specific DNA sequences or motifs, are elementary to the regulation of transcription. The gene is regulated by a combination of TFs in close proximity. Analysis of co-TFs is an important problem in understanding the mechanism of transcriptional regulation. Recently, ChIP-seq in mapping TF provides a large amount of experimental data to analyze co-TFs. Several studies show that if two TFs are co-associated, the relative distance between TFs exhibits a peak-like distribution. In order to analyze co-TFs, we develop a novel method to evaluate the associated situation between TFs. We design an adjacency score based on …
A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab
A Machine Learning Approach For Enhancing Security And Quality Of Service Of Optical Burst Switching Networks, Adel Dabash A. Rajab
Theses and Dissertations
The Optical Bust Switching (OBS) network has become one of the most promising switching technologies for building the next-generation of internet backbone infrastructure. However, OBS networks still face a number of security and Quality of Service (QoS) challenges, particularly from Burst Header Packet (BHP) flooding attacks. In OBS, a core switch handles requests, reserving one of the unoccupied channels for incoming data bursts (DB) through BHP. An attacker can exploit this fact and send malicious BHP without the corresponding DB. If unresolved, threats such as BHP flooding attacks can result in low bandwidth utilization, limited network performance, high burst loss …
Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das
Blind Change Point Detection And Regime Segmentation Using Gaussian Process Regression, Sourav Das
Theses and Dissertations
Time-series analysis is used heavily in modeling and forecasting weather, economics, medical data as well as in various other fields. Change point detection (CPD) means finding abrupt changes in the time-series when the statistical property of a certain part of it starts to differ. CPD has attracted a lot of attention in the artificial intelligence, machine learning and data mining communities. In this thesis, a novel CPD algorithm is introduced for segmenting multivariate time-series data. The proposed algorithm is a general pipeline to process any high dimensional multivariate time-series data using nonlinear non-parametric dynamic system. It consists of manifold learning …
Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han
Improving Facial Action Unit Recognition Using Convolutional Neural Networks, Shizhong Han
Theses and Dissertations
Recognizing facial action units (AUs) from spontaneous facial expression is a challenging problem, because of subtle facial appearance changes, free head movements, occlusions, and limited AU-coded training data. Most recently, convolutional neural networks (CNNs) have shown promise on facial AU recognition. However, CNNs are often overfitted and do not generalize well to unseen subject due to limited AU-coded training images. In order to improve the performance of facial AU recognition, we developed two novel CNN frameworks, by substituting the traditional decision layer and convolutional layer with the incremental boosting layer and adaptive convolutional layer respectively, to recognize the AUs from …
Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner
Underwater Cave Mapping And Reconstruction Using Stereo Vision, Nicholas Weidner
Theses and Dissertations
This work presents a systematic approach for 3-D mapping and reconstruction of underwater caves. Exploration of underwater caves is very important for furthering our understanding of hydrogeology, managing efficiently water resources, and advancing our knowledge in marine archaeology. Underwater cave exploration by human divers however, is a tedious, labor intensive, extremely dangerous operation, and requires highly skilled people. As such, it is an excellent fit for robotic technology. The proposed solution employs a stereo camera and a video-light. The approach utilizes the intersection of the cone of video-light with the cave boundaries resulting in the construction of a wire frame …
Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj
Mobile Application For Shipping Goods For Individuals And Truckers In India, Sendurr Selvaraj
Theses and Dissertations
India is a vast country with majority of its cities and towns connected through roads. Road transportation contributes to 86% share of the freight transport of the country with trucking companies dominating the entire space. With growing economy and demands raising, the quality of service of the trucking company remains poor. The major reasons are unorganized practice and lack of transparency. Moreover, limited access for customers to reach out to truckers to transport their goods.
This thesis aims to create a platform for customers and truckers to realize their needs with a help of a mobile application. Customers can search …
Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri
Improving Peptide Identification By Considering Ordered Amino Acid Usage, Ahmed Al-Qurri
Theses and Dissertations
Proteomics has made major progress in recent years after the sequencing of the genomes of a substantial number of organisms. A typical method for identifying peptides uses a database of peptides identified using tandem mass spectrometry (MS/MS). The profile of accurate mass and elution time (AMT) for peptides that need to be identified will be compared with this database. Restricting the search to those peptides detectable by MS will reduce processing time and more importantly increase accuracy. In addition, there are significant impacts for clinical studies. Proteotypic peptides are those peptides in a protein sequence that are most likely to …
Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang
Investigate Genomic 3d Structure Using Deep Neural Network, Yan Zhang
Theses and Dissertations
The 3D structures of the chromosomes play fundamental roles in essential cellular functions, e.g., gene regulation, gene expression, evolution and Hi-C technique provides the interaction density between loci on chromosomes. In this dissertation, we developed multiple algorithms, focusing the deep learning approach, to study the Hi-C datasets and the genomic 3D structures.
Building 3D structure of the genome one of the most critical purpose of the Hi-C technique. Recently, several approaches have been developed to reconstruct the 3D model of the chromosomes from HiC data. However, all of the methods are based on a particular mathematical model and lack of …
Visibility-Based Pursuit-Evasion In The Plane, Nicholas Michael Stiffler
Visibility-Based Pursuit-Evasion In The Plane, Nicholas Michael Stiffler
Theses and Dissertations
As technological advances further increase the amount of memory and computing power available to mobile robots, we are seeing an unprecedented explosion in the utilization of deployable robots for various tasks. The speed at which robots begin to enter various domains is largely dependent on the availability of robust and efficient algorithms that are capable of solving the complex planning problems inherent to the given domain. One such domain which is experiencing unprecedented growth in recent years requires a robot to detect and/or track a mobile agent or group of agents.
In these scenarios, there are typically two players with …
Dynamic 3d Zverse Models On The Web, Alexa Ann Breeland, Ming Wong
Dynamic 3d Zverse Models On The Web, Alexa Ann Breeland, Ming Wong
Senior Theses
ZVerse is a 3D printing company that is responsible for converting 2D objects into 3D objects. This company specializes in generating 3D collegiate products. Whenever a customer orders a 3D model, such as an alumni brick, it is often helpful to allow customers to see what the object looks like before the purchase. Unfortunately, previewing the brick at runtime is quite a challenging task. The purpose of our project is to create a shopping website that models the existing ZVerse company website and incorporates dynamic 3D rendering of the brick model with the userinput text. The project can be divided …
Internet Of Things To Smart Iot Through Semantic, Cognitive, And Perceptual Computing, Amit P. Sheth
Internet Of Things To Smart Iot Through Semantic, Cognitive, And Perceptual Computing, Amit P. Sheth
Publications
Rapid growth in the Internet of Things (IoT) has resulted in a massive growth of data generated by these devices and sensors put on the Internet. Physical-cyber-social (PCS) big data consist of this IoT data, complemented by relevant Web-based and social data of various modalities. Smart data is about exploiting this PCS big data to get deep insights and make it actionable, and making it possible to facilitate building intelligent systems and applications. This article discusses key AI research in semantic computing, cognitive computing, and perceptual computing. Their synergistic use is expected to power future progress in building intelligent systems …
A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou
A Hierarchical Framework For Phylogenetic And Ancestral Genome Reconstruction On Whole Genome Data, Lingxi Zhou
Theses and Dissertations
Gene order gets evolved under events such as rearrangements, duplications, and losses, which can change both the order and content along the genome, through the long history of genome evolution. Recently, the accumulation of genomic sequences provides researchers with the chance to handle long-standing problems about the phylogenies, or evolutionary histories, of sets of species, and ancestral genomic content and orders. Over the past few years, such problems have been proven so interesting that a large number of algorithms have been proposed in the attempt to resolve them, following different standards. The work presented in this dissertation focuses on algorithms …
Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram
Hydro-Geological Flow Analysis Using Hidden Markov Models, Chandrahas Raj Venkat Gurram
Theses and Dissertations
Hidden Markov Models a class of statistical models used in various disciplines for understanding speech, finding different types of genes responsible for cancer and much more. In this thesis, Hidden Markov Models are used to obtain hidden states that can correlate the flow changes in the Wakulla Spring Cave. Sensors installed in the tunnels of Wakulla Spring Cave have recorded huge correlated changes in the water flows at numerous tunnels. Assuming the correlated flow changes are a consequence of system being in a set of discrete states, a Hidden Markov Model is calculated. This model comprising all the sensors installed …
Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib
Revealing Malicious Contents Hidden In The Internet, Muhammad Nazmus Sakib
Theses and Dissertations
In this age of ubiquitous communication in which we can stay constantly connected with the rest of the world, for most of the part, we have to be grateful for one particular invention - the Internet. But as the popularity of Internet connectivity grows, it has become a very dangerous place where objects of malicious content and intent can be hidden in plain sight. In this dissertation, we investigate different ways to detect and capture these malicious contents hidden in the Internet. First, we propose an automated system that mimics high-risk browsing activities such as clicking on suspicious online ads, …
Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw
Regular Expression Synthesis For Blast Two-Hit Filtering, Jordan Bradshaw
Theses and Dissertations
Genomic databases are exhibiting a growth rate that is outpacing Moore's Law, which has made database search algorithms a popular application for use on emerging processor technologies. NCBI BLAST is the standard tool for performing searches against these databases, which operates by transforming each database query into a filter that is subsequently applied to the database. This requires a database scan for every query, fundamentally limiting its performance by I/O bandwidth. In this dissertation we present a functionally-equivalent variation on the NCBI BLAST algorithm that maps more suitably to an FPGA implementation. This variation of the algorithm attempts to reduce …