Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Physical Sciences and Mathematics

Speaker Identification In Live Events Using Twitter, Minumol Joseph Dec 2015

Speaker Identification In Live Events Using Twitter, Minumol Joseph

Computer Science and Engineering Theses

The prevalence of social media has given rise to a new research area. Data from social media is now being used in research to gather deeper insights into many different fields. Twitter is one of the most popular microblogging websites. Users express themselves on a variety of different topics in 140 characters or less. Oftentimes, users “tweet” about issues and subjects that are gaining in popularity, a great example being politics. Any development in politics frequently results in a tweet of some form. The research which follows focuses on identifying a speaker’s name at a live event by collecting and …


Detecting Real-Time Check-Worthy Factual Claims In Tweets Related To U.S. Politics, Fatma Dogan Dec 2015

Detecting Real-Time Check-Worthy Factual Claims In Tweets Related To U.S. Politics, Fatma Dogan

Computer Science and Engineering Theses

In increasing democracy and improving political discourse, political fact-checking has come to be a necessity. While politicians make claims about facts all the time, journalists and fact-checkers oftentimes reveal them as false, exaggerated, or misleading. Use of technology and social media tools such as Facebook and Twitter has rapidly increased the spread of misinformation. Thus, human fact-checkers face difficulty in keeping up with a massive amount of claims, and falsehoods frequently outpace truths. All U.S. politicians have successively adopted Twitter, and they make use of Twitter for a wide variety of purposes, a great example being making claims to enhance …


Quantitative Analysis Of Scalable Nosql Databases, Surya Narayanan Swaminathan Dec 2015

Quantitative Analysis Of Scalable Nosql Databases, Surya Narayanan Swaminathan

Computer Science and Engineering Theses

NoSQL databases are rapidly becoming the customary data platform for big data applications. These databases are emerging as a gateway for more alternative approaches outside traditional relational databases and are characterized by efficient horizontal scalability, schema-less approach to data modeling, high performance data access, and limited querying capabilities. The lack of transactional semantics among NoSQL databases has made the application determine the choice of a particular con- sistency model. Therefore, it is essential to examine methodically, and in detail, the performance of different databases under different workload conditions. In this work, three of the most commonly used NoSQL databases: MongoDB, …


Lung Cancer Subtype Classification From Whole Slide Histopathological Images, Dheeraj Ganti Dec 2015

Lung Cancer Subtype Classification From Whole Slide Histopathological Images, Dheeraj Ganti

Computer Science and Engineering Theses

Lung Cancer is one of the most serious diseases causing death for human be- ings. The progression of the disease and response to treatment di ers widely among patients. Thus it is very important to classify the type of tumor and also able to predict the clinical outcomes of patients. Majority of lung cancers is Non-Small Cell Lung Cancer (NSCLC) which constitutes of 84 % of all the type of lung cancers. The two major subtypes of NSCLC are Adenocarcinoma (ADC) and Squamous Cell Car- cinoma (SCC). Accurate classi cation of the lung cancer as NSCLC and its subtype classi …


Interactive Dashboard For User Activity Using Network Flow Data, Lalit Kumar Naidu Dec 2015

Interactive Dashboard For User Activity Using Network Flow Data, Lalit Kumar Naidu

Computer Science and Engineering Theses

Data visualization is critical in analytical systems containing multi-dimensional dataset and problems associated with increasing data size. It facilitates the data explanation process of reasoning data and discovering trends with visual perception that are otherwise not evident within the data in its raw form. The challenge involved in visualization is presenting data in such a way that helps end users in the process of information discovery with simple visuals. Interactive visualizations have increasingly become popular in recent years with prominent research in the field of information visualization. These techniques are heavily used in web-based applications to present myriad forms of …


Qp-Subdue: Processing Queries Over Graph Databases, Ankur Goyal Dec 2015

Qp-Subdue: Processing Queries Over Graph Databases, Ankur Goyal

Computer Science and Engineering Theses

Graphs have become one of the preferred ways to store structured data for various applications such as social network graphs, complex molecular structure, etc. Proliferation of graph databases has resulted in a growing need for effective querying methods to retrieve desired information. Querying has been widely studied in relational databases where the query optimizer finds a sequence of query execution steps (or plans) for efficient execution of the given query. Until now, most of the work on graph databases has concentrated on mining. For querying graph databases, users have to either learn a graph query language for posing their queries …


Gpu Deconvolution Wow Result On 2048x2048x32 Plane Z-Series, George Mcnamara Jun 2015

Gpu Deconvolution Wow Result On 2048x2048x32 Plane Z-Series, George Mcnamara

George McNamara

GPU Deconvolution WOW result on 2048x2048x32 plane Z-series ... formerly bad academic code ("you get what you pay for") now impressive

Alternative title: "instant gratification quantitative deconvolution fluorescence microscopy".

http://works.bepress.com/gmcnamara/55/

Please see "74"

http://works.bepress.com/gmcnamara/74/

for 32-bit images from this project (bepress file size limitation prevented me from including them in this ZIP archive).

//

Summary: Deconvolution microscopy has historically been painfully slow. The early vendors were:

- Scanalytics (Carrington and Fay), commercialized to try to sell expensive, specialized array processors made by CSPI (the CSPI box likely had less computing power than a first gen smartphone).

- Applied Precision (Sedat …


Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris Jun 2015

Panorama: Multi-Path Ssl Authentication Using Peer Network Perspectives, William P. Harris

Computer Engineering

SSL currently uses certificates signed by Certificate Authorities (CAs) to authenticate connections. e.g. Google will pay a CA to sign a certificate for them, so that they can prove that they're not someone pretending to be Google. Unfortunately, this system has had multiple problems, and many believe that an alternative needs to be found.

One of the ideas for alternatives is using multiple "network perspectives" to authenticate a server. The idea behind this is that, though playing man-in-the-middle (MITM) with one connection is easy, it should be difficult for an adversary to do so with many connections, especially if they …


A Personalized Profile Based Learning System For Power Management In Android, Ashwin Arikere Jan 2015

A Personalized Profile Based Learning System For Power Management In Android, Ashwin Arikere

Computer Science and Engineering Dissertations

Mobile computing devices are becoming more ubiquitous everyday due to the phenomenal growth in technology powering them. With the amount of computing power available in these devices, users are capable of achieving a multitude of tasks that were only possible with a PC just a few years ago. However, these devices still face issues regarding power management. Battery technology has not kept pace with the development in other areas. With a limited supply of energy, the mobile device of today requires a fine balance of power management to provide adequate energy to support the heavy duty computing of the user …


Tools For Program Understanding And Reverse-Engineering Of Mobile Applications, Tuan Anh Nguyen Jan 2015

Tools For Program Understanding And Reverse-Engineering Of Mobile Applications, Tuan Anh Nguyen

Computer Science and Engineering Dissertations

Mobile software development is evolving rapidly. Software development includes computer programing, documenting, testing and bug fixing processes. These processes need a detail understanding of the application logic which often requires reverse-engineering their artifacts. My thesis identifies and addresses the following three problems in mobile software development, specifically in program understanding and reverse-engineering for mobile application development. (1) There is no graphical on-phone debugger. (2) The second problem is that mobile software programmers have to manually re-implement the conceptual screen drawings or sketches of graphical artists in code, which is cumbersome and expensive. (3) Companies try to “go mobile” (by developing …


Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform, Satishkumar Masilamani Jan 2015

Microblog Analyzer Aggregate Estimation Over A Micro Blog Platform, Satishkumar Masilamani

Computer Science and Engineering Theses

Microblogging is a new mode of communication in which users can share their current status in brief and agile way in the form of text, image, video etc over smart phones, email or web. Recently, Microblogs such as Twitter, Tumblr, Google+ have experience phenomenal growth and are regularly used by millions of users. The data from microblogs is very useful for researchers to analyze various facets such as user behaviors, user intentions (like daily chatter, conversations, sharing information and reporting news), microblog social network structure etc. For example, a sociologist might want to use the microblog postings to analyze the …


Enabling Exploratory Mining Over Hidden Databases, Saravanan Thirumuruganathan Jan 2015

Enabling Exploratory Mining Over Hidden Databases, Saravanan Thirumuruganathan

Computer Science and Engineering Dissertations

Almost all popular websites (such as Amazon, EBay, microblogs such as Twitter, Instagram, collaborative content sites such as IMDB, Yelp etc) are powered internally by large data repositories. We designate them as hidden databases as their underlying data is accessible only through proprietary form-like interfaces that require users to query the system by entering desired values for a few attributes. Further, these web databases also impose a number of restrictions. For example, the top-k output constraint ensures that when there are a large number of tuples matching the query, only a few of them (top-k) are preferentially selected and returned …


Faster Sampling Over Theoritical And Online Social Networks, Ramakrishna Aduri Jan 2015

Faster Sampling Over Theoritical And Online Social Networks, Ramakrishna Aduri

Computer Science and Engineering Theses

Online social networks have become very popular recently and are used bymillions of users. Researchers increasingly want to leverage the rich variety ofinformation available. However, social networks often feature a web interface that onlyallows local-neighborhood queries - i.e., given a user of the online social network asinput, the system returns the immediate neighbors of the user. Additionally, they alsohave rate limits that restrict the number of queries issued over a given time period. Theserestrictions make third party analytics extremely challenging. The traditional approach ofusing random walks is not effective as they require significant burn-in period before theirstationary distribution converges to …


A Real-Time Embedded Data Acquisition System For Surface Measurements Using Multiple Line Lasers, A P Vikram Simha Jan 2015

A Real-Time Embedded Data Acquisition System For Surface Measurements Using Multiple Line Lasers, A P Vikram Simha

Computer Science and Engineering Theses

In the last few years there has been a significant increase in the number of hand held devices. These devices boast of delivering features such as high performance, low power consumption, high memory availability, serial and parallel interfacing capability, connectivity through the Ethernet, wireless, etc., at a very low cost. These embedded devices powered by open source software like Linux and Arduino have paved the way for the development of high efficiency, low cost portable products in a very short period of time.The objective of this thesis is to enhance the portability, efficiency, and other features of the existing Roline …


Design And Analysis Of Place-Based Opportunistic Networks, Yanliang Liu Jan 2015

Design And Analysis Of Place-Based Opportunistic Networks, Yanliang Liu

Computer Science and Engineering Dissertations

The swift growth and popularization of wireless technology and mobile smart phones have unfolded various opportunities and challenges before researchers' eyes. Opportunistic networks is one of the interesting and challenging topics. Generally speaking, opportunistic networks exploit the potential capability of existing mobile devices carried by people to provide pervasive computing service, such as data forwarding, without pre-planted infrastructures. The movement of mobile devices introduced by human activity plays a crucial role in the functionality of opportunistic networks, since it influences the contacts between different mobile devices. It is wellknown that human movement presents these place-centered features: intermittent hops between places …


Performance Comparison Of Spatial Indexing Structures For Different Query Types, Neelabh Pant Jan 2015

Performance Comparison Of Spatial Indexing Structures For Different Query Types, Neelabh Pant

Computer Science and Engineering Theses

R-Trees are among the most popular multidimensional access methods suitable for indexing two dimensional spatial data and point data. R-Trees are found in most of the spatial database systems for indexing the spatial data. The data include points, lines and polygons which are retrieved and stored efficiently. There are many Spatial Database Systems which have incorporated R-Trees, for example, IBM Informix, Oracle Spatial, PostgreSQL and many others.Another version of R-Tree is R*-Tree which is also used for the same purpose i.e. indexing spatial data. R*-Tree has also been incorporated in an open source software SQLite with an extension of Spatialite. …


The Impact Of Different Cues On The Memorability Of System-Assigned Recognition-Based Textual Passwords, Kanis Fatema Jan 2015

The Impact Of Different Cues On The Memorability Of System-Assigned Recognition-Based Textual Passwords, Kanis Fatema

Computer Science and Engineering Theses

To ensure memorability, users employ predictable patterns when creating new passwords. These patterns make passwords easy to guess, which not only increases risks to users but also for the entire system. In contrast, system-assigned textual passwords offer security but suffer from poor memorability. Previous research investigated the idea of textual recognition, in which the user would be assigned a word from a list and asked to recall the word later. The recall rate for this scheme was shown to be no better than memorizing a sequence of randomly assigned letters, but the researchers suggested that memorability may be improved if …


Simultaneous Optimization Of Performance, Energy, And Temperature While Allocating Tasks To Multi-Cores, Hafiz Fahad Sheikh Jan 2015

Simultaneous Optimization Of Performance, Energy, And Temperature While Allocating Tasks To Multi-Cores, Hafiz Fahad Sheikh

Computer Science and Engineering Dissertations

Multi-core processors have emerged as a solution to the problem of ever-increasing demands for computing power. However, higher power dissipation levels resulting into thermal problems and increasing cooling costs are major factors limiting their scalability into larger systems. Therefore, dynamic thermal management (DTM) and dynamic power management (DPM) of multi/many-core systems have emerged as important areas of research. The existing resource management approaches are either energy-aware or thermal-aware. In this dissertation, we focus on a new problem of simultaneous performance (P), energy (E), and temperature (T) optimized scheduling (PETOS) for allocating tasks to multi-core systems. To allocate a set of …


Advanced Sparsity Techniques In Medical Imaging And Image Processing, Chen Chen Jan 2015

Advanced Sparsity Techniques In Medical Imaging And Image Processing, Chen Chen

Computer Science and Engineering Theses

In the past decades, sparsity techniques has been widely applied in the fields of medical imaging, computer vision, image processing, compressive sensing, machine learning etc., and gained great success. In this work, we propose new models of sparsity techniques, which is an extension to the standard sparsity used in the existing works and in the vein of structure sparsity families. First, we introduce the wavelet tree sparsity in natural images. It shows that the tree sparsity regularization often outperforms the existing standard sparsity based techniques in magnetic resonance imaging. Second, we extend the tree sparsity to forest sparsity on multi-channel …


Methods For Large-Scale Machine Learning And Computer Vision, Yeqing Li Jan 2015

Methods For Large-Scale Machine Learning And Computer Vision, Yeqing Li

Computer Science and Engineering Dissertations

With the advance of the Internet and information technology, nowadays people can easily collect and store tremendous amounts of data such as images and videos. Developing machine learning and computer vision to analysis and learn from the gigantic data sets is an interesting yet challenging problem. Inspired by the trend, this thesis focus on developing large-scale machine learning and computer vision techniques for the purpose of handling various kinds of problems on gigantic data sets. With respect to the problem of image classification, we employ the technique of sub-selection, which uses partial observations to efficiently approximate the original high dimensional …


Gait Analysis On A Smart Floor For Health Monitoring, Oluwatosin Oluwadare Jan 2015

Gait Analysis On A Smart Floor For Health Monitoring, Oluwatosin Oluwadare

Computer Science and Engineering Theses

Gait analysis is the investigation of an individual pattern of walking. Based on studies in Psychophysics, it has been shown that the human gait contains unique information that is useful for the evaluation of foot and gait pathologies. The goal of this project is to use a floor mounted pressure sensor system capable of measuring a significant number of parameters relevant to gait to predict and detect anomalous behavior. The system consists of an array of pressure sensors mounted under floor tiles and computer hardware responsible for data collection. The method used in this project is unique since most systems …


Methods For Human Motion Analysis For American Sign Language Recognition And Assistive Environments, Zhong Zhang Jan 2015

Methods For Human Motion Analysis For American Sign Language Recognition And Assistive Environments, Zhong Zhang

Computer Science and Engineering Dissertations

The broad application domain of the work presented in this thesis is human motion analysis with a focus on hand detection for American Sign Language recognition and fall detection for assistive environments.One of the motivations of the proposed thesis is a semi-automatic vision based American Sign Language recognition system. This system allows a user to submit as query a video of the sign of interest, or simply perform the sign in front of a camera. The system then asks the user to annotate the hands' locations in the sign. Next, the hand trajectory of the query sign is compared with …


Evaluating The Effectiveness Of Ben In Localizing Different Types Of Software Fault, Jaganmohan Chandrasekaran Jan 2015

Evaluating The Effectiveness Of Ben In Localizing Different Types Of Software Fault, Jaganmohan Chandrasekaran

Computer Science and Engineering Theses

Debugging refers to the activity of locating software faults in a program and is considered to be one of the most challenging tasks during software development. Automated fault localization tools have been developed to reduce the amount of effort and time software developers have to spend on debugging. In this thesis, we evaluate the effectiveness of a fault localization tool called BEN in locating different types of software faults. Assuming that combinatorial testing has been performed on the subject program, BEN leverages the result obtained from combinatorial testing to perform fault localization. Our evaluation focuses on how the following three …


Biomedical Parameter Measurements Using Video Processing, Negar Ziaee Nasrabadi Jan 2015

Biomedical Parameter Measurements Using Video Processing, Negar Ziaee Nasrabadi

Computer Science and Engineering Theses

For quite some time, patients’ cardiovascular parameters have been measured by sensors connected to their body. One way of measuring these parameters is pulse oximetry by using an optical technique. It uses a photodetector to detect light absorption changes of red and infrared light. These two types of light serve as two sources of illumination. These current types of methods for monitoring parameters are often viewed as uncomfortable by the patient, and therefore are not desirable for frequent and long periods of monitoring. Furthermore, these methods can potentially produce a psychologically influenced bias from the patient because the patient is …


Sparse Representation Based Classification: Towards Efficiency And Accuracy, Soheil Shafiee Jan 2015

Sparse Representation Based Classification: Towards Efficiency And Accuracy, Soheil Shafiee

Computer Science and Engineering Dissertations

With the fast growing deployment of machine intelligence in several real-life applications, there are always increasing needs for faster and more precise machine learning algorithms, especially classification and object recognition. One of the most recent methods proposed for this purpose is Sparse Representation-based Classification (SRC) which works based on the emerging theory of Compressive Sensing. SRC shows excellent classification results in comparison to many well-known classification approaches. However, despite its high recognition power, SRC suffers from high computational and memory costs as it directly uses all original ground truth data as representatives to build its training model. Given high recognition …


Mechanical Reliability Of Porous Low-K Dielectrics For Advanced Interconnect: Study Of The Instability Mechanisms In Porous Low-K Dielectrics And Their Mediation Through Inert Plasma Induced Re-Polymerization Of The Backbone Structure, Yoonki Sa Jan 2015

Mechanical Reliability Of Porous Low-K Dielectrics For Advanced Interconnect: Study Of The Instability Mechanisms In Porous Low-K Dielectrics And Their Mediation Through Inert Plasma Induced Re-Polymerization Of The Backbone Structure, Yoonki Sa

Computer Science and Engineering Dissertations

Continuous scaling down of critical dimensions in interconnect structures requires the use of ultralow dielectric constant (k) films as interlayer dielectrics to reduce resistance-capacitance delays. Porous carbon-doped silicon oxide (p-SiCOH) dielectrics have been the leading approach to produce these ultralow-k materials. However, embedding of porosity into dielectric layer necessarily decreases the mechanical reliability and increases its susceptibility to adsorption of potentially deleterious chemical species during device fabrication process. Among those, exposure of porous-SiCOH low-k (PLK) dielectrics to oxidizing plasma environment causes the increase in dielectric constant and their vulnerability to mechanical instability of PLKs due to the loss of methyl …


Design And Implementation Of An Open Beaconing Architecture For Internet Of Things, Arjun Kumar Bhaskar Shetty Jan 2015

Design And Implementation Of An Open Beaconing Architecture For Internet Of Things, Arjun Kumar Bhaskar Shetty

Computer Science and Engineering Theses

The power of the Internet is penetrating into the physical world with ever increasing speed and expanding reach under the general concept of Internet of Things. Extensive sets of efforts have been devoted toward establishing an interconnected network of smart devices in a self-organized manner. Nowadays, using low power beacons to announce the presences of physical objects has gained tremendous momentum exemplified by iBeacon from Apple. Unfortunately, schemes like iBeacon use abstract codes to denote a physical entity, limiting it to be only understandable by those with knowledge of it beforehand. In this thesis, we develop an open architecture where …


Human Factors In Textual Password-Based Authentication, S M Taiabul Haque Jan 2015

Human Factors In Textual Password-Based Authentication, S M Taiabul Haque

Computer Science and Engineering Dissertations

Despite being the most commonly used method of authentication on the Web, textual password-based authentication is by no means a panacea as long as usability is concerned. In this dissertation work, we address some usability issues of textual password-based authentication and propose solutions to them. In our first work, we examine the problem of multiple password management and identify the mental model of users for managing multiple password-protected accounts. We propose a hierarchy of password importance and use an experiment to examine the degree ofsimilarity between passwords for lower-level (e.g. news portal) and higher-level (e.g. banking) websites in this hierarchy. …