Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Physical Sciences and Mathematics

Cloud Merge: Heterogeneous Cloud Application Migration Using Platform As A Service, Mayank Jain Dec 2016

Cloud Merge: Heterogeneous Cloud Application Migration Using Platform As A Service, Mayank Jain

Computer Science and Engineering Theses

With the evolution of cloud service providers offering numerous services such as SaaS, IaaS, PaaS, options for enterprises to choose the best set of services under optimal costs have also increased. The migration of web applications across these heterogeneous platforms comes with ample of options to choose from, providing users the flexibility to choose the best options suiting their requirements. This process of migration must be automated to ensure the security, performance and availability, keeping the cost to be optimal while moving the application from one platform to another. A multi-tier web application will have many dependencies such as the …


Mavroomie: An End-To-End Architecture For Finding Compatible Roommates Based On User Preferences, Vijendra Bhogadi Dec 2016

Mavroomie: An End-To-End Architecture For Finding Compatible Roommates Based On User Preferences, Vijendra Bhogadi

Computer Science and Engineering Theses

Team Formation is widely studied in literature as a method for forming teams or groups under certain constraints. However, very few works address the aspect of collaboration while forming groups under certain constraints. Motivated by the collaborative team formation, we try to extend the problem of team formation to a general problem in the real world scenario of finding compatible roommates to share a place. There are numerous applications like “roommates.com" ,”roomiematch.com" , “Roomi” which try to find roommates based on geographical and cost factors and ignore the important human factors which can play a substantial role in finding a …


Convolutional And Recurrent Neural Networks For Pedestrian Detection, Vivek Arvind Balaji Dec 2016

Convolutional And Recurrent Neural Networks For Pedestrian Detection, Vivek Arvind Balaji

Computer Science and Engineering Theses

Pedestrian Detection in real time has become an interesting and a challenging problem lately. With the advent of autonomous vehicles and intelligent traffic monitoring systems, more time and money are being invested into detecting and locating pedestrians for their safety and towards achieving complete autonomy in vehicles. For the task of pedestrian detection, Convolutional Neural Networks (ConvNets) have been very promising over the past decade. ConvNets have a typical feed-forward structure and they share many properties with the visual system of the human brain. On the other hand, Recurrent Neural Networks (RNNs) are emerging as an important technique for image …


Predicting Human Behavior Based On Survey Response Patterns Using Markov And Hidden Markov Models, Arun Kumar Pokharna Dec 2016

Predicting Human Behavior Based On Survey Response Patterns Using Markov And Hidden Markov Models, Arun Kumar Pokharna

Computer Science and Engineering Theses

With technological advancements in World Wide Web (www), connecting with people for gathering information has become common. Among several ways, surveys are one of the most commonly used way of collecting information from people. Given a specific objective, multiple surveys are conducted to collect various pieces of information. This collected information, in the form of survey responses, can be categorical values or a descriptive text that represents information regarding the survey question. If additional details regarding the response behavior, scenario in which survey is being responded, or survey outcomes is available, machine learning and prediction modeling can be used to …


Integrative Approaches For Large-Scale Biomedical Data Analysis, Ashis Kumer Biswas Dec 2016

Integrative Approaches For Large-Scale Biomedical Data Analysis, Ashis Kumer Biswas

Computer Science and Engineering Dissertations

Advancement of the Next Generation Sequencing (NGS), also known as the High Throughput Sequencing (HTS) technologies allow researchers investigate genome, transcriptome, or epigenome of any organism from any perspective, thereby contributing to the enrichment of the biomedical data repositories for many of the lesser known phenomena. The regulatory activities inside genome by the non-coding RNAs (ncRNAs), the transcribed product of the long-neglected "junk DNA" molecules is one such phenomenon. While large-scale data about the ncRNAs are becoming publicly available, the computational challenges are being imposed to the bioinformaticians for efficient mining to get reliable answers to few subtle questions. Given …


Remote Patient Monitoring Using Health Bands With Activity Level Prescription, Pranay Shirolkar Dec 2016

Remote Patient Monitoring Using Health Bands With Activity Level Prescription, Pranay Shirolkar

Computer Science and Engineering Theses

With the advent of new commercially available consumer grade fitness and health devices, it is now possible and very common for users to obtain, store, share and learn about some of their important physiological metrics such as steps taken, heart rate, quality of sleep and skin temperature. For devices with this wearable technology, it is common to find these sensors embedded in a smart watch, or dedicated wearable wrist bands such that among other functionalities of a wearable device, it is capable of smartly assisting users about their activity levels by leveraging the fact that these devices can be, and …


Improving Memorization And Long Term Recall Of System Assigned Passwords, Jayesh Doolani Dec 2016

Improving Memorization And Long Term Recall Of System Assigned Passwords, Jayesh Doolani

Computer Science and Engineering Theses

Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password also assist users with memorization and recall. In this work, we have designed a novel technique that employs rote memorization inform of an engaging game, which is played during the account registration process. Based on prior work on chunking, we break a password into three equal chunks, and then the game helps plant those chunks in memory. We present the findings of 17 participant user-study, where we …


Fault Detection And Localization Techniques For Concurrent Programs, Jing Xu Dec 2016

Fault Detection And Localization Techniques For Concurrent Programs, Jing Xu

Computer Science and Engineering Dissertations

Concurrency faults are hard to detect and localize due to the nondeterministic behavior of concurrent programs. In this dissertation, we present three approaches to detecting and localizing faults in concurrent programs. The first approach identifies erroneous event patterns in a failed concurrent program execution. Given a failed execution, we characterize the execution as a sequence of context-switch points and then use controlled execution to distinguish erroneous context-switch points from benign context-switch points. Erroneous context-switch points are used to derive erroneous event patterns, which allow the user to quickly localize the actual fault. Our experiments were conducted on thirteen programs. Seven …


Learning Perception To Action Mapping For Functional Imitation, Bhupender Singh Dec 2016

Learning Perception To Action Mapping For Functional Imitation, Bhupender Singh

Computer Science and Engineering Theses

Imitation leaning is the learning of advanced behavior whereby an agent acquires a skill by observing another's behavior while performing the same skill. The main objective of imitation learning is to make robots usable for a variety of tasks without programming them but by simply demonstrating new tasks. The power of this approach arises since end users of such robots will frequently not know how to program the robot, might not understand the dynamics and behavioral capabilities of the system, and might not know how to program these robots to get different/new tasks done. Some challenges in achieving imitation capabilities …


Machine Learning Based Datacenter Monitoring Framework, Ravneet Singh Sidhu Dec 2016

Machine Learning Based Datacenter Monitoring Framework, Ravneet Singh Sidhu

Computer Science and Engineering Theses

Monitoring the health of large data centers is a major concern with the ever-increasing demand of grid/cloud computing and the higher need of computational power. In a High Performance Computing (HPC) environment, the need to maintain high availability makes monitoring tasks and hardware more daunting and demanding. As data centers grow it becomes hard to manage the complex interactions between different systems. Many open source systems have been implemented which give specific state of any individual machine using Nagios, Ganglia or Torque monitoring software. In this work we focus on the detection and prediction of data center anomalies by using …


Cell Segmentation In Cancer Histopathology Images Using Convolutional Neural Networks, Viswanathan Kavassery Rajalingam Dec 2016

Cell Segmentation In Cancer Histopathology Images Using Convolutional Neural Networks, Viswanathan Kavassery Rajalingam

Computer Science and Engineering Theses

Cancer, the second most dreadful disease causing large scale deaths in humans is characterized by uncontrolled growth of cells in the human body and the ability of those cells to migrate from the original site and spread to distant sites. The major proportion of deaths in cancer is due to improper primary diagnosis that raises the need for Computer Aided Diagnosis (CAD). Digital Pathology is a technique that acts as second set of eyes to radiologists in delivering expert level preliminary diagnosis for cancer patients. Cell segmentation is a challenging step in digital pathology that identifies cell regions from micro-slide …


Extracting And Modeling Useful Information From Videos For Supporting Continuous Queries, Manish Kumar Annappa Dec 2016

Extracting And Modeling Useful Information From Videos For Supporting Continuous Queries, Manish Kumar Annappa

Computer Science and Engineering Theses

Automating video stream processing for inferring situations of interest has been an ongoing challenge. This problem is currently exacerbated by the volume of surveillance/monitoring videos generated. Currently, manual or context-based customized techniques are used for this purpose. To the best to our knowledge the attempted work in this area use a custom query language to extract data and infer simple situations from the video streams, thus adding an additional overhead to learn their query language. Objective of the work in this thesis is to develop a framework that extracts data from video streams generating a data representation such that simple …


Integration Of Apache Mrql Query Language With Apache Storm Realtime Computational System, Achyut Paudel Dec 2016

Integration Of Apache Mrql Query Language With Apache Storm Realtime Computational System, Achyut Paudel

Computer Science and Engineering Theses

The use of real time processing of data has increased in recent years with the increase of data captured by social media platforms, IOT and other big data applications. The processing of data in real time has been an important aspect of the day from finding the trends over the internet to fraud detection of in the banking transactions. Finding relevant information from large amount of data has always been a difficult problem to solve. MRQL is a query language that can be used on top of different big data platform such as Apache Hadoop, Flink, Hama, and Spark that …


Linchpin: A Yaml Template Based Cross Cloud Resource Provisioning Tool, Samvaran Kashyap Rallabandi Dec 2016

Linchpin: A Yaml Template Based Cross Cloud Resource Provisioning Tool, Samvaran Kashyap Rallabandi

Computer Science and Engineering Theses

A cloud application developed, will have a specific requirement of particular cloud resources and software stack to be deployed to make it run. Resource templates enable the environment design and deployment required for an application. A template describes the infrastructure of the cloud application in a text file which includes servers, floating/public IP, storage volumes, etc. This approach is termed “Infrastructure as a code.” In Amazon public cloud, OpenStack private cloud, Google cloud these templates are called as cloud formation templates, HOT (Heat orchestration templates), Google cloud templates respectively. Though the existing template systems give a flexibility for the end …


Cloud Hopper: A Unified Cloud Solution To Manage Heterogeneous Clouds, Shraddha Jain Dec 2016

Cloud Hopper: A Unified Cloud Solution To Manage Heterogeneous Clouds, Shraddha Jain

Computer Science and Engineering Theses

Cloud environments are built on virtualization platforms which offer scalability, on-demand pricing, high performance, elasticity, easy accessibility of the resources and cost efficient services. Most of the small and large businesses use cloud computing to take advantage of these features. The usage of the cloud resources depends on the requirements of the organizations. With the advent of cloud computing, the traditional way of handling machines by the IT professionals has decreased. However, it leads to wastage of resources due to inadequate monitoring and improper management of resources. Often it happens that the cloud resources once deployed are forgotten, and they …


Exploratory Data Analysis Over Online Community Networks, Azade Nazi Dec 2016

Exploratory Data Analysis Over Online Community Networks, Azade Nazi

Computer Science and Engineering Dissertations

An online community network links entities (e.g., users, products) with various relationships (e.g., friendship, co-purchase) and make such information available for access through a web interface. There are numerous such networks on the web, ranging from Twitter, Instagram, which links users as ``followers-followees'', to amazon.com, ebay.com, which links products with relationships such as ``also buy''. Online community networks often feature a web interface that only allows local-neighborhood queries - i.e., given a entity (e.g., users, products) of the community network as input, the system only returns the immediate neighbors of the entity. Further, the rate limit constraint restricts the number …


Evaluation Of Html Tag Susceptibility To Statistical Fingerprinting For Use In Censorship Evasion, Kelly Scott French Dec 2016

Evaluation Of Html Tag Susceptibility To Statistical Fingerprinting For Use In Censorship Evasion, Kelly Scott French

Computer Science and Engineering Theses

The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of commercial efforts typically to silence criticism or squelch dissent, and people's efforts to evade such censorship. This is even more so evident in the current environment with its ever-growing number of communication technologies and platforms available to individuals around the world. If the face of efforts to control communication before it is posted or to prevent the discovery of information that exists outside of the …


Searching And Classifying Mobile Application Screenshots, Adis Kovacevic Dec 2016

Searching And Classifying Mobile Application Screenshots, Adis Kovacevic

Computer Science and Engineering Theses

Searching for a particular application layout image is a challenging task. No search provider gives an adequate method to filter the query results to the look of a mobile application. Searching for a particular style of application requires lots of manual time sifting through the results returned. Search engines such as Google are too broad and return too many unrelated results without providing sufficient filters on things like category or layout type. This paper proposes a technique that would allow the searching and classifying of mobile application screenshots based on the layout of the content, the category of the application, …


Creating Art Patterns With Math And Code, Boyan Kostadinov Aug 2016

Creating Art Patterns With Math And Code, Boyan Kostadinov

Publications and Research

The goal of this talk is to showcase some visualization projects that we developed for a 3-day Code in R summer program, designed to inspire the creative side of our STEM students by engaging them with computational projects that we developed with the purpose of mixing calculus level math and code to create complex geometric patterns. One of the goals of this program was to attract more minority and female students into applied math and computer science majors.

The projects are designed to be implemented using the high-level, open-source and free computational environment R, a popular software in industry for …


Building 3d Shape Primitive Based Object Models From Range Images, Vamsikrishna Gopikrishna Aug 2016

Building 3d Shape Primitive Based Object Models From Range Images, Vamsikrishna Gopikrishna

Computer Science and Engineering Dissertations

Most pattern recognition approaches to object identification work in the image domain. However this is ignoring potential information that can be provided by depth information. Using range images, we can build a set of geometric depth features. These depth features can be used to identify basic three-dimensional shape primitives. There have been many studies regarding object identification in humans that postulate that at least at a primary level object recognition works by breaking down objects into its component parts. To build a similar Recognition-by-component (RBC) system we need a system to identify these shape primitives. We build a depth feature …


Lilac: The Second Generation Lightweight Low-Latency Anonymous Chat., Revanth Rao Pobala Aug 2016

Lilac: The Second Generation Lightweight Low-Latency Anonymous Chat., Revanth Rao Pobala

Computer Science and Engineering Theses

Instant messaging is one of the most used modes of communication and there are many instant messaging systems available online. Studies from the Electronic Frontier Foundation show that there are only a few instant messengers that keep your messages safe by providing ,security and limited anonymity. Lilac, a Lightweight Low-latency Anonymous Chat, is a secure instant messenger that provides security as well as better anonymity to users as compared to other messengers. It is a browser-based instant messaging system that uses Tor like a model to protect user anonymity. Compared to existing messengers, LILAC protects the users from tra?c analysis …


Personalization And Data Relation Exploration Using Predictive Analytics For The Production And Distributed Analysis System (Panda), Mikhail Titov Aug 2016

Personalization And Data Relation Exploration Using Predictive Analytics For The Production And Distributed Analysis System (Panda), Mikhail Titov

Computer Science and Engineering Dissertations

Efficient data distribution among computing centers is one of the biggest challenges in large-scale scientific distributed computing systems. Such data distribution issues include: i) the rational utilization of storage and computing resources, ii) the minimization of the completion time for data processing (which requires a reduction in redundant data transfers, and intelligent allocation of processing tasks), and iii) user experience enhancement, i.e., availability and fast access to the desired data, and discovery of new relevant data. In the literature and in practice, there have been significant new approaches to the improvement of workflow management to address the above described issues, …


Distributed Data Intensive Computing On Graph, Upa Gupta Aug 2016

Distributed Data Intensive Computing On Graph, Upa Gupta

Computer Science and Engineering Dissertations

Distributed frameworks, such as MapReduce and Spark, have been developed by industry and research groups to analyze the vast amount of data that is being generated on a daily basis. Many graphs of interest, such as the Web graph and Social Networks, increase their size daily at an unprecedented scale and rate. To cope with this vast amount of data, researchers have been using distributed processing frameworks to analyze these graphs extensively. Most of these graph algorithms are iterative in nature, requiring repetitive distributed jobs. This dissertation presents a new design pattern for a family of iterative graph algorithms for …


Improving Accuracy In Large Vocabulary Sign Search Systems, Christopher Conly Aug 2016

Improving Accuracy In Large Vocabulary Sign Search Systems, Christopher Conly

Computer Science and Engineering Dissertations

An automated computer vision-based dictionary system for looking up the meaning of signs can be an invaluable tool both for students and native users of sign languages. Students may not know the meaning of a sign they encounter and would like to learn what it is. A native signer knows what it means to them but may be unsure of the equivalent in English. Such a system can return a ranked video list of the most similar signs to a query video and allow the user to browse the video results to find the desired sign and its meaning. This …


Toward Automated Fact Monitoring And Checking, Naeemul Hassan Aug 2016

Toward Automated Fact Monitoring And Checking, Naeemul Hassan

Computer Science and Engineering Dissertations

Public figures such as politicians make claims about "facts" all the time. Oftentimes there are false, exaggerated and misleading claims on important topics, due to careless mistakes and even deliberate manipulation of information. With technology and modern day media helping spread information to mass audiences through all types of channels, there is a pressing need for checking the veracity of factual claims important to the public. Journalists and citizens spend a good amount of time doing that. More and more dedicated platforms and institutes are being created for fact-checking. This nascent genre of investigative reporting has become a basic feature …


Evaluate The Use Of Fpga Soc For Real Time Data Acquisition And Aggregate Micro-Texture Measurement Using Laser Sensors, Mudit Pradhan Aug 2016

Evaluate The Use Of Fpga Soc For Real Time Data Acquisition And Aggregate Micro-Texture Measurement Using Laser Sensors, Mudit Pradhan

Computer Science and Engineering Theses

Aggregate texture has been found to play an important role in improving the longevity of highways and pavements. Aggregates with appropriate surface roughness level have an improved bonding with asphalt binder and concrete mixture to produce a more durable road surface. Macro-texture has been found to effect certain other important features of the road surface for example, the skid resistance, flow of water on the surface and noise of the tyre on road. However, more research need to done to access the impact of surface texture at micro-meter level. Accurate measurement of the micro-texture at high resolution and in real-time …


Distributed Data Management In Opportunistic Networks, Chance Ray Eary Aug 2016

Distributed Data Management In Opportunistic Networks, Chance Ray Eary

Computer Science and Engineering Dissertations

Opportunistic networks (ONs) allow wireless devices, primarily mobile, to interact with one another through a series of opportunistic contacts. While ONs exploit mobility of devices to route messages and distribute information in the absence of dedicated networking infrastructure, the intermittent connections among devices make many traditional computer collaboration paradigms difficult to realize. Two such paradigms are distributed transactions and distributed shared memory (DSM). Distributed transactions are a sequence of operations, executed across multiple nodes, that must successfully complete as specified by its program, or abort with no changes to memory. DSM allows multiple, independent nodes to collectively operate on a …


Techniques For Spatio-Temporal Analysis Of Trajectory Data, Praveen Kumar Tripathi Aug 2016

Techniques For Spatio-Temporal Analysis Of Trajectory Data, Praveen Kumar Tripathi

Computer Science and Engineering Dissertations

The goal of this thesis is to develop novel techniques for the analysis of spatio-temporal trajectory data. Recent advances in tracking devices such as Global Positioning System (GPS) and mobile phones have resulted in an abundance of spatio-temporal trajectory data. Because of the importance of both the space and time dimensions in trajectory data, different analysis techniques are needed. The analysis techniques explored in this thesis involve two variations: point based analysis and trajectory based analysis. Point based analysis has been done to identify the hot spots in the trajectory dataset (hurricane data). Here we consider the trajectory data as …


Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack May 2016

Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack

Biology and Medicine Through Mathematics Conference

No abstract provided.


2016-01-A3dsrinp-Csc-Sta-Cmb-522-Bps-542, Raymond Pulver, Neal Buxton, Xiaodong Wang, John Lucci, Jean Yves Hervé, Lenore Martin May 2016

2016-01-A3dsrinp-Csc-Sta-Cmb-522-Bps-542, Raymond Pulver, Neal Buxton, Xiaodong Wang, John Lucci, Jean Yves Hervé, Lenore Martin

Bioinformatics Software Design Projects

Cholesterol is carried and transported through bloodstream by lipoproteins. There are two types of lipoproteins: low density lipoprotein, or LDL, and high density lipoprotein, or HDL. LDL cholesterol is considered “bad” cholesterol because it can form plaque and hard deposit leading to arteries clog and make them less flexible. Heart attack or stroke will happen if the hard deposit blocks a narrowed artery. HDL cholesterol helps to remove LDL from the artery back to the liver.

Traditionally, particle counts of LDL and HDL plays an important role to understanding and prediction of heart disease risk. But recently research suggested that …