Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Machine learning (4)
- Data mining (3)
- AWS (2)
- Convolutional neural networks (2)
- Fault localization (2)
-
- MRQL (2)
- Multi-cloud (2)
- Sign language recognition (2)
- Spatio-temporal (2)
- Usable security (2)
- Action behavior mapping (1)
- Active learning (1)
- Activity level (1)
- Affinity (1)
- After-school program (1)
- Analysis (1)
- Android (1)
- Anonymous chat (1)
- Anti-censorship (1)
- Apache Hadoop (1)
- Apache MRQL (1)
- Apache Spark (1)
- Apache storm (1)
- Apriori (1)
- Art (1)
- Artificial intelligence (1)
- Assist (1)
- Association rules (1)
- Band (1)
- Baum-Welch algorithm (1)
- Publication
- Publication Type
Articles 1 - 30 of 45
Full-Text Articles in Physical Sciences and Mathematics
Cloud Merge: Heterogeneous Cloud Application Migration Using Platform As A Service, Mayank Jain
Cloud Merge: Heterogeneous Cloud Application Migration Using Platform As A Service, Mayank Jain
Computer Science and Engineering Theses
With the evolution of cloud service providers offering numerous services such as SaaS, IaaS, PaaS, options for enterprises to choose the best set of services under optimal costs have also increased. The migration of web applications across these heterogeneous platforms comes with ample of options to choose from, providing users the flexibility to choose the best options suiting their requirements. This process of migration must be automated to ensure the security, performance and availability, keeping the cost to be optimal while moving the application from one platform to another. A multi-tier web application will have many dependencies such as the …
Mavroomie: An End-To-End Architecture For Finding Compatible Roommates Based On User Preferences, Vijendra Bhogadi
Mavroomie: An End-To-End Architecture For Finding Compatible Roommates Based On User Preferences, Vijendra Bhogadi
Computer Science and Engineering Theses
Team Formation is widely studied in literature as a method for forming teams or groups under certain constraints. However, very few works address the aspect of collaboration while forming groups under certain constraints. Motivated by the collaborative team formation, we try to extend the problem of team formation to a general problem in the real world scenario of finding compatible roommates to share a place. There are numerous applications like “roommates.com" ,”roomiematch.com" , “Roomi” which try to find roommates based on geographical and cost factors and ignore the important human factors which can play a substantial role in finding a …
Convolutional And Recurrent Neural Networks For Pedestrian Detection, Vivek Arvind Balaji
Convolutional And Recurrent Neural Networks For Pedestrian Detection, Vivek Arvind Balaji
Computer Science and Engineering Theses
Pedestrian Detection in real time has become an interesting and a challenging problem lately. With the advent of autonomous vehicles and intelligent traffic monitoring systems, more time and money are being invested into detecting and locating pedestrians for their safety and towards achieving complete autonomy in vehicles. For the task of pedestrian detection, Convolutional Neural Networks (ConvNets) have been very promising over the past decade. ConvNets have a typical feed-forward structure and they share many properties with the visual system of the human brain. On the other hand, Recurrent Neural Networks (RNNs) are emerging as an important technique for image …
Predicting Human Behavior Based On Survey Response Patterns Using Markov And Hidden Markov Models, Arun Kumar Pokharna
Predicting Human Behavior Based On Survey Response Patterns Using Markov And Hidden Markov Models, Arun Kumar Pokharna
Computer Science and Engineering Theses
With technological advancements in World Wide Web (www), connecting with people for gathering information has become common. Among several ways, surveys are one of the most commonly used way of collecting information from people. Given a specific objective, multiple surveys are conducted to collect various pieces of information. This collected information, in the form of survey responses, can be categorical values or a descriptive text that represents information regarding the survey question. If additional details regarding the response behavior, scenario in which survey is being responded, or survey outcomes is available, machine learning and prediction modeling can be used to …
Integrative Approaches For Large-Scale Biomedical Data Analysis, Ashis Kumer Biswas
Integrative Approaches For Large-Scale Biomedical Data Analysis, Ashis Kumer Biswas
Computer Science and Engineering Dissertations
Advancement of the Next Generation Sequencing (NGS), also known as the High Throughput Sequencing (HTS) technologies allow researchers investigate genome, transcriptome, or epigenome of any organism from any perspective, thereby contributing to the enrichment of the biomedical data repositories for many of the lesser known phenomena. The regulatory activities inside genome by the non-coding RNAs (ncRNAs), the transcribed product of the long-neglected "junk DNA" molecules is one such phenomenon. While large-scale data about the ncRNAs are becoming publicly available, the computational challenges are being imposed to the bioinformaticians for efficient mining to get reliable answers to few subtle questions. Given …
Remote Patient Monitoring Using Health Bands With Activity Level Prescription, Pranay Shirolkar
Remote Patient Monitoring Using Health Bands With Activity Level Prescription, Pranay Shirolkar
Computer Science and Engineering Theses
With the advent of new commercially available consumer grade fitness and health devices, it is now possible and very common for users to obtain, store, share and learn about some of their important physiological metrics such as steps taken, heart rate, quality of sleep and skin temperature. For devices with this wearable technology, it is common to find these sensors embedded in a smart watch, or dedicated wearable wrist bands such that among other functionalities of a wearable device, it is capable of smartly assisting users about their activity levels by leveraging the fact that these devices can be, and …
Improving Memorization And Long Term Recall Of System Assigned Passwords, Jayesh Doolani
Improving Memorization And Long Term Recall Of System Assigned Passwords, Jayesh Doolani
Computer Science and Engineering Theses
Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password also assist users with memorization and recall. In this work, we have designed a novel technique that employs rote memorization inform of an engaging game, which is played during the account registration process. Based on prior work on chunking, we break a password into three equal chunks, and then the game helps plant those chunks in memory. We present the findings of 17 participant user-study, where we …
Fault Detection And Localization Techniques For Concurrent Programs, Jing Xu
Fault Detection And Localization Techniques For Concurrent Programs, Jing Xu
Computer Science and Engineering Dissertations
Concurrency faults are hard to detect and localize due to the nondeterministic behavior of concurrent programs. In this dissertation, we present three approaches to detecting and localizing faults in concurrent programs. The first approach identifies erroneous event patterns in a failed concurrent program execution. Given a failed execution, we characterize the execution as a sequence of context-switch points and then use controlled execution to distinguish erroneous context-switch points from benign context-switch points. Erroneous context-switch points are used to derive erroneous event patterns, which allow the user to quickly localize the actual fault. Our experiments were conducted on thirteen programs. Seven …
Learning Perception To Action Mapping For Functional Imitation, Bhupender Singh
Learning Perception To Action Mapping For Functional Imitation, Bhupender Singh
Computer Science and Engineering Theses
Imitation leaning is the learning of advanced behavior whereby an agent acquires a skill by observing another's behavior while performing the same skill. The main objective of imitation learning is to make robots usable for a variety of tasks without programming them but by simply demonstrating new tasks. The power of this approach arises since end users of such robots will frequently not know how to program the robot, might not understand the dynamics and behavioral capabilities of the system, and might not know how to program these robots to get different/new tasks done. Some challenges in achieving imitation capabilities …
Machine Learning Based Datacenter Monitoring Framework, Ravneet Singh Sidhu
Machine Learning Based Datacenter Monitoring Framework, Ravneet Singh Sidhu
Computer Science and Engineering Theses
Monitoring the health of large data centers is a major concern with the ever-increasing demand of grid/cloud computing and the higher need of computational power. In a High Performance Computing (HPC) environment, the need to maintain high availability makes monitoring tasks and hardware more daunting and demanding. As data centers grow it becomes hard to manage the complex interactions between different systems. Many open source systems have been implemented which give specific state of any individual machine using Nagios, Ganglia or Torque monitoring software. In this work we focus on the detection and prediction of data center anomalies by using …
Cell Segmentation In Cancer Histopathology Images Using Convolutional Neural Networks, Viswanathan Kavassery Rajalingam
Cell Segmentation In Cancer Histopathology Images Using Convolutional Neural Networks, Viswanathan Kavassery Rajalingam
Computer Science and Engineering Theses
Cancer, the second most dreadful disease causing large scale deaths in humans is characterized by uncontrolled growth of cells in the human body and the ability of those cells to migrate from the original site and spread to distant sites. The major proportion of deaths in cancer is due to improper primary diagnosis that raises the need for Computer Aided Diagnosis (CAD). Digital Pathology is a technique that acts as second set of eyes to radiologists in delivering expert level preliminary diagnosis for cancer patients. Cell segmentation is a challenging step in digital pathology that identifies cell regions from micro-slide …
Extracting And Modeling Useful Information From Videos For Supporting Continuous Queries, Manish Kumar Annappa
Extracting And Modeling Useful Information From Videos For Supporting Continuous Queries, Manish Kumar Annappa
Computer Science and Engineering Theses
Automating video stream processing for inferring situations of interest has been an ongoing challenge. This problem is currently exacerbated by the volume of surveillance/monitoring videos generated. Currently, manual or context-based customized techniques are used for this purpose. To the best to our knowledge the attempted work in this area use a custom query language to extract data and infer simple situations from the video streams, thus adding an additional overhead to learn their query language. Objective of the work in this thesis is to develop a framework that extracts data from video streams generating a data representation such that simple …
Integration Of Apache Mrql Query Language With Apache Storm Realtime Computational System, Achyut Paudel
Integration Of Apache Mrql Query Language With Apache Storm Realtime Computational System, Achyut Paudel
Computer Science and Engineering Theses
The use of real time processing of data has increased in recent years with the increase of data captured by social media platforms, IOT and other big data applications. The processing of data in real time has been an important aspect of the day from finding the trends over the internet to fraud detection of in the banking transactions. Finding relevant information from large amount of data has always been a difficult problem to solve. MRQL is a query language that can be used on top of different big data platform such as Apache Hadoop, Flink, Hama, and Spark that …
Linchpin: A Yaml Template Based Cross Cloud Resource Provisioning Tool, Samvaran Kashyap Rallabandi
Linchpin: A Yaml Template Based Cross Cloud Resource Provisioning Tool, Samvaran Kashyap Rallabandi
Computer Science and Engineering Theses
A cloud application developed, will have a specific requirement of particular cloud resources and software stack to be deployed to make it run. Resource templates enable the environment design and deployment required for an application. A template describes the infrastructure of the cloud application in a text file which includes servers, floating/public IP, storage volumes, etc. This approach is termed “Infrastructure as a code.” In Amazon public cloud, OpenStack private cloud, Google cloud these templates are called as cloud formation templates, HOT (Heat orchestration templates), Google cloud templates respectively. Though the existing template systems give a flexibility for the end …
Cloud Hopper: A Unified Cloud Solution To Manage Heterogeneous Clouds, Shraddha Jain
Cloud Hopper: A Unified Cloud Solution To Manage Heterogeneous Clouds, Shraddha Jain
Computer Science and Engineering Theses
Cloud environments are built on virtualization platforms which offer scalability, on-demand pricing, high performance, elasticity, easy accessibility of the resources and cost efficient services. Most of the small and large businesses use cloud computing to take advantage of these features. The usage of the cloud resources depends on the requirements of the organizations. With the advent of cloud computing, the traditional way of handling machines by the IT professionals has decreased. However, it leads to wastage of resources due to inadequate monitoring and improper management of resources. Often it happens that the cloud resources once deployed are forgotten, and they …
Exploratory Data Analysis Over Online Community Networks, Azade Nazi
Exploratory Data Analysis Over Online Community Networks, Azade Nazi
Computer Science and Engineering Dissertations
An online community network links entities (e.g., users, products) with various relationships (e.g., friendship, co-purchase) and make such information available for access through a web interface. There are numerous such networks on the web, ranging from Twitter, Instagram, which links users as ``followers-followees'', to amazon.com, ebay.com, which links products with relationships such as ``also buy''. Online community networks often feature a web interface that only allows local-neighborhood queries - i.e., given a entity (e.g., users, products) of the community network as input, the system only returns the immediate neighbors of the entity. Further, the rate limit constraint restricts the number …
Evaluation Of Html Tag Susceptibility To Statistical Fingerprinting For Use In Censorship Evasion, Kelly Scott French
Evaluation Of Html Tag Susceptibility To Statistical Fingerprinting For Use In Censorship Evasion, Kelly Scott French
Computer Science and Engineering Theses
The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of commercial efforts typically to silence criticism or squelch dissent, and people's efforts to evade such censorship. This is even more so evident in the current environment with its ever-growing number of communication technologies and platforms available to individuals around the world. If the face of efforts to control communication before it is posted or to prevent the discovery of information that exists outside of the …
Searching And Classifying Mobile Application Screenshots, Adis Kovacevic
Searching And Classifying Mobile Application Screenshots, Adis Kovacevic
Computer Science and Engineering Theses
Searching for a particular application layout image is a challenging task. No search provider gives an adequate method to filter the query results to the look of a mobile application. Searching for a particular style of application requires lots of manual time sifting through the results returned. Search engines such as Google are too broad and return too many unrelated results without providing sufficient filters on things like category or layout type. This paper proposes a technique that would allow the searching and classifying of mobile application screenshots based on the layout of the content, the category of the application, …
Creating Art Patterns With Math And Code, Boyan Kostadinov
Creating Art Patterns With Math And Code, Boyan Kostadinov
Publications and Research
The goal of this talk is to showcase some visualization projects that we developed for a 3-day Code in R summer program, designed to inspire the creative side of our STEM students by engaging them with computational projects that we developed with the purpose of mixing calculus level math and code to create complex geometric patterns. One of the goals of this program was to attract more minority and female students into applied math and computer science majors.
The projects are designed to be implemented using the high-level, open-source and free computational environment R, a popular software in industry for …
Building 3d Shape Primitive Based Object Models From Range Images, Vamsikrishna Gopikrishna
Building 3d Shape Primitive Based Object Models From Range Images, Vamsikrishna Gopikrishna
Computer Science and Engineering Dissertations
Most pattern recognition approaches to object identification work in the image domain. However this is ignoring potential information that can be provided by depth information. Using range images, we can build a set of geometric depth features. These depth features can be used to identify basic three-dimensional shape primitives. There have been many studies regarding object identification in humans that postulate that at least at a primary level object recognition works by breaking down objects into its component parts. To build a similar Recognition-by-component (RBC) system we need a system to identify these shape primitives. We build a depth feature …
Lilac: The Second Generation Lightweight Low-Latency Anonymous Chat., Revanth Rao Pobala
Lilac: The Second Generation Lightweight Low-Latency Anonymous Chat., Revanth Rao Pobala
Computer Science and Engineering Theses
Instant messaging is one of the most used modes of communication and there are many instant messaging systems available online. Studies from the Electronic Frontier Foundation show that there are only a few instant messengers that keep your messages safe by providing ,security and limited anonymity. Lilac, a Lightweight Low-latency Anonymous Chat, is a secure instant messenger that provides security as well as better anonymity to users as compared to other messengers. It is a browser-based instant messaging system that uses Tor like a model to protect user anonymity. Compared to existing messengers, LILAC protects the users from tra?c analysis …
Personalization And Data Relation Exploration Using Predictive Analytics For The Production And Distributed Analysis System (Panda), Mikhail Titov
Personalization And Data Relation Exploration Using Predictive Analytics For The Production And Distributed Analysis System (Panda), Mikhail Titov
Computer Science and Engineering Dissertations
Efficient data distribution among computing centers is one of the biggest challenges in large-scale scientific distributed computing systems. Such data distribution issues include: i) the rational utilization of storage and computing resources, ii) the minimization of the completion time for data processing (which requires a reduction in redundant data transfers, and intelligent allocation of processing tasks), and iii) user experience enhancement, i.e., availability and fast access to the desired data, and discovery of new relevant data. In the literature and in practice, there have been significant new approaches to the improvement of workflow management to address the above described issues, …
Distributed Data Intensive Computing On Graph, Upa Gupta
Distributed Data Intensive Computing On Graph, Upa Gupta
Computer Science and Engineering Dissertations
Distributed frameworks, such as MapReduce and Spark, have been developed by industry and research groups to analyze the vast amount of data that is being generated on a daily basis. Many graphs of interest, such as the Web graph and Social Networks, increase their size daily at an unprecedented scale and rate. To cope with this vast amount of data, researchers have been using distributed processing frameworks to analyze these graphs extensively. Most of these graph algorithms are iterative in nature, requiring repetitive distributed jobs. This dissertation presents a new design pattern for a family of iterative graph algorithms for …
Improving Accuracy In Large Vocabulary Sign Search Systems, Christopher Conly
Improving Accuracy In Large Vocabulary Sign Search Systems, Christopher Conly
Computer Science and Engineering Dissertations
An automated computer vision-based dictionary system for looking up the meaning of signs can be an invaluable tool both for students and native users of sign languages. Students may not know the meaning of a sign they encounter and would like to learn what it is. A native signer knows what it means to them but may be unsure of the equivalent in English. Such a system can return a ranked video list of the most similar signs to a query video and allow the user to browse the video results to find the desired sign and its meaning. This …
Toward Automated Fact Monitoring And Checking, Naeemul Hassan
Toward Automated Fact Monitoring And Checking, Naeemul Hassan
Computer Science and Engineering Dissertations
Public figures such as politicians make claims about "facts" all the time. Oftentimes there are false, exaggerated and misleading claims on important topics, due to careless mistakes and even deliberate manipulation of information. With technology and modern day media helping spread information to mass audiences through all types of channels, there is a pressing need for checking the veracity of factual claims important to the public. Journalists and citizens spend a good amount of time doing that. More and more dedicated platforms and institutes are being created for fact-checking. This nascent genre of investigative reporting has become a basic feature …
Evaluate The Use Of Fpga Soc For Real Time Data Acquisition And Aggregate Micro-Texture Measurement Using Laser Sensors, Mudit Pradhan
Evaluate The Use Of Fpga Soc For Real Time Data Acquisition And Aggregate Micro-Texture Measurement Using Laser Sensors, Mudit Pradhan
Computer Science and Engineering Theses
Aggregate texture has been found to play an important role in improving the longevity of highways and pavements. Aggregates with appropriate surface roughness level have an improved bonding with asphalt binder and concrete mixture to produce a more durable road surface. Macro-texture has been found to effect certain other important features of the road surface for example, the skid resistance, flow of water on the surface and noise of the tyre on road. However, more research need to done to access the impact of surface texture at micro-meter level. Accurate measurement of the micro-texture at high resolution and in real-time …
Distributed Data Management In Opportunistic Networks, Chance Ray Eary
Distributed Data Management In Opportunistic Networks, Chance Ray Eary
Computer Science and Engineering Dissertations
Opportunistic networks (ONs) allow wireless devices, primarily mobile, to interact with one another through a series of opportunistic contacts. While ONs exploit mobility of devices to route messages and distribute information in the absence of dedicated networking infrastructure, the intermittent connections among devices make many traditional computer collaboration paradigms difficult to realize. Two such paradigms are distributed transactions and distributed shared memory (DSM). Distributed transactions are a sequence of operations, executed across multiple nodes, that must successfully complete as specified by its program, or abort with no changes to memory. DSM allows multiple, independent nodes to collectively operate on a …
Techniques For Spatio-Temporal Analysis Of Trajectory Data, Praveen Kumar Tripathi
Techniques For Spatio-Temporal Analysis Of Trajectory Data, Praveen Kumar Tripathi
Computer Science and Engineering Dissertations
The goal of this thesis is to develop novel techniques for the analysis of spatio-temporal trajectory data. Recent advances in tracking devices such as Global Positioning System (GPS) and mobile phones have resulted in an abundance of spatio-temporal trajectory data. Because of the importance of both the space and time dimensions in trajectory data, different analysis techniques are needed. The analysis techniques explored in this thesis involve two variations: point based analysis and trajectory based analysis. Point based analysis has been done to identify the hot spots in the trajectory dataset (hurricane data). Here we consider the trajectory data as …
Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack
Hill's Diagrammatic Method And Reduced Graph Powers, Gregory D. Smith, Richard Hammack
Biology and Medicine Through Mathematics Conference
No abstract provided.
2016-01-A3dsrinp-Csc-Sta-Cmb-522-Bps-542, Raymond Pulver, Neal Buxton, Xiaodong Wang, John Lucci, Jean Yves Hervé, Lenore Martin
2016-01-A3dsrinp-Csc-Sta-Cmb-522-Bps-542, Raymond Pulver, Neal Buxton, Xiaodong Wang, John Lucci, Jean Yves Hervé, Lenore Martin
Bioinformatics Software Design Projects
Cholesterol is carried and transported through bloodstream by lipoproteins. There are two types of lipoproteins: low density lipoprotein, or LDL, and high density lipoprotein, or HDL. LDL cholesterol is considered “bad” cholesterol because it can form plaque and hard deposit leading to arteries clog and make them less flexible. Heart attack or stroke will happen if the hard deposit blocks a narrowed artery. HDL cholesterol helps to remove LDL from the artery back to the liver.
Traditionally, particle counts of LDL and HDL plays an important role to understanding and prediction of heart disease risk. But recently research suggested that …