Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 50

Full-Text Articles in Physical Sciences and Mathematics

A Gpu Stream Computing Approach To Terrain Database Integrity Monitoring, Sean Patrick Mckeon Jul 2009

A Gpu Stream Computing Approach To Terrain Database Integrity Monitoring, Sean Patrick Mckeon

Computer Science Theses

Synthetic Vision Systems (SVS) provide an aircraft pilot with a virtual 3-D image of surrounding terrain which is generated from a digital elevation model stored in an onboard database. SVS improves the pilot's situational awareness at night and in inclement weather, thus reducing the chance of accidents such as controlled flight into terrain. A terrain database integrity monitor is needed to verify the accuracy of the displayed image due to potential database and navigational system errors. Previous research has used existing aircraft sensors to compare the real terrain position with the predicted position. We propose an improvement to one of …


A Browser-Based Collaborative Multimedia Messaging System, Susan Gayle Gentner Apr 2009

A Browser-Based Collaborative Multimedia Messaging System, Susan Gayle Gentner

Computer Science Theses

Making a communication tool easier for people to operate can have profound and positive effects on its popularity and on the users themselves. This thesis is about making it easier for people to publish web-based documents that have sound, video and text. Readily available software and hardware are employed in an attempt to achieve the goal of providing a software service that enables users to compose audio-video documents with text.


Implementing Energy-Saving Improvements To The Ieee 802.15.4 Mac Protocol, Marco Valero Apr 2009

Implementing Energy-Saving Improvements To The Ieee 802.15.4 Mac Protocol, Marco Valero

Computer Science Theses

IEEE 802.15.4 is a standard designed for low data rate wireless personal area networks (WPANs) intended to provide connectivity to mobile devices. Such devices present considerable storage, energy, and communication constraints. However, they can be used in a variety of applications like home/office automation, environmental control and more. In order to extend the lifetime of the WPAN, we propose some changes to the standard including modifications to the Superframe Guaranteed Time Slot (GTS) distribution which can be optimized to reduce energy consumption. We implemented the proposed improvements to the IEEE 802.15.4 protocol using real sensor nodes. Specifically, we conducted an …


An Adaptive Mesh Mpi Framework For Iterative C++ Programs, Karunamuni Charuka Silva Mar 2009

An Adaptive Mesh Mpi Framework For Iterative C++ Programs, Karunamuni Charuka Silva

Computer Science Theses

Computational Science and Engineering (CSE) applications often exhibit the pattern of adaptive mesh applications. Adaptive mesh algorithm starts with a coarse base-level grid structure covering entire computational domain. As the computation intensified, individual grid points are tagged for refinement. Such tagged grid points are dynamically overlayed with finer grid points. Similarly if the level of refinement in a cell is greater than required, all such regions are replaced with coarser grids. These refinements proceed recursively. We have developed an object-oriented framework enabling time-stepped adaptive mesh application developers to convert their sequential applications to MPI applications in few easy steps. We …


Proxy Module For System On Mobile Devices (Syd) Middleware, Joseph Gunawan Nov 2008

Proxy Module For System On Mobile Devices (Syd) Middleware, Joseph Gunawan

Computer Science Theses

Nowadays, users of mobile devices are growing. The users expect that they could communicate constantly using their mobile devices while they are also constantly moving. Therefore, there is a need to provide disconnection tolerance of transactions in the mobile devices’ platforms and its synchronization management. System on Mobile Devices (SyD) is taken as one of the examples of mobile devices’ platforms. The thesis studies the existing SyD architecture, from its framework into its kernel, and introduces the proxy module enhancement in SyD to handle disconnection tolerance, including its synchronization. SyD kernel has been extended for the purpose of enabling proxy …


802.11 Fingerprinting To Detect Wireless Stealth Attacks, Aravind Venkataraman Nov 2008

802.11 Fingerprinting To Detect Wireless Stealth Attacks, Aravind Venkataraman

Computer Science Theses

We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or …


Senmincom: Pervasive Distributed Dynamic Sensor Data Mining For Effective Commerce, Naveen Hiremath Jul 2008

Senmincom: Pervasive Distributed Dynamic Sensor Data Mining For Effective Commerce, Naveen Hiremath

Computer Science Theses

In last few years, the use of wireless sensor networks and cell phones has become ubiquitous; fusing these technologies in the field of business will open up new possibilities. To fill this lacuna, I propose a novel idea where the combination of these will facilitate companies to receive feedback on their products and services. System's unobtrusive sensors will not only collect shopping, mobile usage data from consumers but will also make effective use of this information to increase revenue, cut costs, etc.; the use of mobile agent based data mining allows analyzing the data from different dimensions, categorizing it on …


Ws-Cdl Based Specification For Web Services Collaboration Testing, Ahmed A. Ugaas Apr 2008

Ws-Cdl Based Specification For Web Services Collaboration Testing, Ahmed A. Ugaas

Computer Science Theses

Service Oriented Computing(SOC) is becoming a major paradigm for developing next generation of software systems, and one of the major challenges of Service Oriented Computing is testing interactions and collaborations among the distributed and dynamically integrated web services. To support automated test of web service‟s collaborations, a formal specification is needed. This thesis proposes a specification of web services collaborations based on Web Services Choreography Description Language (WS-CDL). We identify the basic constructs that can be found in any web services collaboration, and we mapped them to the new WS-CDL based language (WS-CDL+). Finally, A scenario of web services collaboration …


Peer-To-Peer Distributed Syd Directory Synchronization In A Proximity-Based Environment, Sunetri Priyanka Dasari Nov 2007

Peer-To-Peer Distributed Syd Directory Synchronization In A Proximity-Based Environment, Sunetri Priyanka Dasari

Computer Science Theses

Distributed directory services are an evolving paradigm in the distributed computing arena. They are a shift from the centralized directory that causes delay and does not scale well to widespread peer-to-peer networks. With networking becoming more pervasive, there is a need to integrate the heterogeneity of device, data and network with the applications that are built on them. SyD or System on Mobile Devices is a middleware that is being used to implement such a distributed directory service. To provide a persistent global view of data, we serialize and synchronize the distributed directories. The SyD APIs provide a high-level environment …


A Contextualized Web-Based Learning Environments For Devs Models, Inthira Srivrunyoo Nov 2007

A Contextualized Web-Based Learning Environments For Devs Models, Inthira Srivrunyoo

Computer Science Theses

With the advance in applying technology in education, the traditional lecture-driven teaching style is gradually replaced by a more active teaching style where the students play a more active rule in the learning process. In this paper we introduce a new initiative to provide a suite of online tools for learning DEVS model. The uniqueness of this tutorial project is the integration of information technology and multimedia into education through the development of an interactive tutorial and the characteristic of contextualized learning. The tutorial teaches students about the basic aspects of discrete event system and simulation. The interactive tutorial fully …


Genotype/Haplotype Tagging Methods And Their Validation, Jun Zhang Nov 2007

Genotype/Haplotype Tagging Methods And Their Validation, Jun Zhang

Computer Science Theses

This study focuses how the MLR-tagging for statistical covering, i.e. either maximizing average R2 for certain number of requested tags or minimizing number of tags such that for any non-tag SNP there exists a highly correlated (squared correlation R2 > 0.8) tag SNP. We compare with tagger, a software for selecting tags in hapMap project. MLR-tagging needs less number of tags than tagger in all 6 cases of the given test sets except 2. Meanwhile, Biologists can detect or collect data only from a small set. So, this will bring a problem for scientists that the estimates accuracy of tag SNPs …


Ammp-Extn: A User Privacy And Collaboration Control Framework For A Multi-User Collaboratory Virtual Reality System, Wenjun Ma Oct 2007

Ammp-Extn: A User Privacy And Collaboration Control Framework For A Multi-User Collaboratory Virtual Reality System, Wenjun Ma

Computer Science Theses

In this thesis, we propose a new design of privacy and session control for improving a collaborative molecular modeling CVR system AMMP-VIS [1]. The design mainly addresses the issue of competing user interests and privacy protection coordination. Based on our investigation of AMMP-VIS, we propose a four-level access control structure for collaborative sessions and dynamic action priority specification for manipulations on shared molecular models. Our design allows a single user to participate in multiple simultaneous sessions. Moreover, a messaging system with text chatting and system broadcasting functionality is included. A 2D user interface [2] for easy command invocation is developed …


A Distributed Approach To Crawl Domain Specific Hidden Web, Lovekeshkumar Desai Aug 2007

A Distributed Approach To Crawl Domain Specific Hidden Web, Lovekeshkumar Desai

Computer Science Theses

A large amount of on-line information resides on the invisible web - web pages generated dynamically from databases and other data sources hidden from current crawlers which retrieve content only from the publicly indexable Web. Specially, they ignore the tremendous amount of high quality content "hidden" behind search forms, and pages that require authorization or prior registration in large searchable electronic databases. To extracting data from the hidden web, it is necessary to find the search forms and fill them with appropriate information to retrieve maximum relevant information. To fulfill the complex challenges that arise when attempting to search hidden …


Informative Snp Selection And Validation, Diana Mohan Babu Aug 2007

Informative Snp Selection And Validation, Diana Mohan Babu

Computer Science Theses

The search for genetic regions associated with complex diseases, such as cancer or Alzheimer's disease, is an important challenge that may lead to better diagnosis and treatment. The existence of millions of DNA variations, primarily single nucleotide polymorphisms (SNPs), may allow the fine dissection of such associations. However, studies seeking disease association are limited by the cost of genotyping SNPs. Therefore, it is essential to find a small subset of informative SNPs (tag SNPs) that may be used as good representatives of the rest of the SNPs. Several informative SNP selection methods have been developed. Our experiments compare favorably to …


A Domain-Specific Conceptual Query System, Xiuyun Shen Aug 2007

A Domain-Specific Conceptual Query System, Xiuyun Shen

Computer Science Theses

This thesis presents the architecture and implementation of a query system resulted from a domain-specific conceptual data modeling and querying methodology. The query system is built for a high level conceptual query language that supports dynamically user-defined domain-specific functions and application-specific functions. It is DBMS-independent and can be translated to SQL and OQL through a normal form. Currently, it has been implemented in neuroscience domain and can be applied to any other domain.


A Physical Estimation Based Continuous Monitoring Scheme For Wireless Sensor Networks, Wiwek Deshmukh Jul 2007

A Physical Estimation Based Continuous Monitoring Scheme For Wireless Sensor Networks, Wiwek Deshmukh

Computer Science Theses

Data estimation is emerging as a powerful strategy for energy conservation in sensor networks. In this thesis is reported a technique, called Data Estimation using Physical Method (DEPM), that efficiently conserves battery power in an environment that may take a variety of complex manifestations in real situations. The methodology can be ported easily with minor changes to address a multitude of tasks by altering the parameters of the algorithm and ported on any platform. The technique aims at conserving energy in the limited energy supply source that runs a sensor network by enabling a large number of sensors to go …


An Analysis Of The Mos Under Conditions Of Delay, Jitter And Packet Loss And An Analysis Of The Impact Of Introducing Piggybacking And Reed Solomon Fec For Voip, Alexander F. Ribadeneira May 2007

An Analysis Of The Mos Under Conditions Of Delay, Jitter And Packet Loss And An Analysis Of The Impact Of Introducing Piggybacking And Reed Solomon Fec For Voip, Alexander F. Ribadeneira

Computer Science Theses

Voice over IP (VoIP) is a real time application that allows transmitting voice through the Internet network. Recently there has been amazing progress in this field, mainly due to the development of voice codecs that react appropriately under conditions of packet loss, and the improvement of intelligent jitter buffers that perform better under conditions of variable inter packet delay. In addition, there are other factors that indirectly benefited VoIP. Today, computer networks are faster due to the advances in hardware and breakthrough algorithms. As a result, the quality of VoIP calls has improved considerably. However, the quality of VoIP calls …


Robot-In-The-Loop Simulation To Support Multi-Robot System Development: A Dynamic Team Formation Example, Ehsan Azarnasab May 2007

Robot-In-The-Loop Simulation To Support Multi-Robot System Development: A Dynamic Team Formation Example, Ehsan Azarnasab

Computer Science Theses

Modeling and simulation provides a powerful technology for engineers and managers to understand, design, and evaluate a system under development. Traditionally, simulation is only used in early stages of a system design. However, with the advances of hardware and software technology, it is now possible to extend simulation to late stages for supporting a full life cycle simulation-based development. Robot-in-the-loop simulation, where real robots work together with virtual ones, has been developed to support such a development process to bridge the gap between simulation and reality.


An Automated Xml-Based Webform Management System, Piyaphol Phoungphol May 2007

An Automated Xml-Based Webform Management System, Piyaphol Phoungphol

Computer Science Theses

In a web application, “webform” plays an important role in providing interactions between users and a server. To develop a webform in conventional method, developers have to create many files including HTML-JavaScript, SQL script, and many server-side programs to process to data. In this thesis, we propose a new language, Webform Language (WFL). WFL can considerably decrease developing time of webform by describing it in XML and a parser will automatically generate all necessary files. In addition, we give an option for user to describe a webform in another language, called Simple Webform Language (SWFL). The syntax of a SWFL …


An Energy-Efficient Distributed Algorithm For K-Coverage Problem In Wireless Sensor Networks, Chinh Trung Vu May 2007

An Energy-Efficient Distributed Algorithm For K-Coverage Problem In Wireless Sensor Networks, Chinh Trung Vu

Computer Science Theses

Wireless sensor networks (WSNs) have recently achieved a great deal of attention due to its numerous attractive applications in many different fields. Sensors and WSNs possesses a number of special characteristics that make them very promising in many applications, but also put on them lots of constraints that make issues in sensor network particularly difficult. These issues may include topology control, routing, coverage, security, and data management. In this thesis, we focus our attention on the coverage problem. Firstly, we define the Sensor Energy-efficient Scheduling for k-coverage (SESK) problem. We then solve it by proposing a novel, completely localized and …


Distributed Algorithms For Improving Wireless Sensor Network Lifetime With Adjustable Sensing Range, Aung Aung May 2007

Distributed Algorithms For Improving Wireless Sensor Network Lifetime With Adjustable Sensing Range, Aung Aung

Computer Science Theses

Wireless sensor networks are made up of a large number of sensors deployed randomly in an ad-hoc manner in the area/target to be monitored. Due to their weight and size limitations, the energy conservation is the most critical issue. Energy saving in a wireless sensor network can be achieved by scheduling a subset of sensor nodes to activate and allowing others to go into low power sleep mode, or adjusting the transmission or sensing range of wireless sensor nodes. In this thesis, we focus on improving the lifetime of wireless sensor networks using both smart scheduling and adjusting sensing ranges. …


Protein Secondary Structure Prediction Using Support Vector Machines, Nueral Networks And Genetic Algorithms, Anjum B. Reyaz-Ahmed May 2007

Protein Secondary Structure Prediction Using Support Vector Machines, Nueral Networks And Genetic Algorithms, Anjum B. Reyaz-Ahmed

Computer Science Theses

Bioinformatics techniques to protein secondary structure prediction mostly depend on the information available in amino acid sequence. Support vector machines (SVM) have shown strong generalization ability in a number of application areas, including protein structure prediction. In this study, a new sliding window scheme is introduced with multiple windows to form the protein data for training and testing SVM. Orthogonal encoding scheme coupled with BLOSUM62 matrix is used to make the prediction. First the prediction of binary classifiers using multiple windows is compared with single window scheme, the results shows single window not to be good in all cases. Two …


Structure Learning Of A Behavior Network For Context Dependent Adaptability, Ou Li Dec 2006

Structure Learning Of A Behavior Network For Context Dependent Adaptability, Ou Li

Computer Science Theses

One mechanism for an intelligent agent to adapt to substantial environmental changes is to change its decision making structure. Pervious work in this area has developed a context-dependent behavior selection architecture that uses structure change, i.e., changing the mutual inhibition structures of a behavior network, as the main mechanism to generate different behavior patterns according to different behavioral contexts. Given the important of network structure, this work investigates how the structure of a behavior network can be learned. We developed a structure learning method based on generic algorithm and applied it to a model crayfish that needs to survive in …


Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain Dec 2006

Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain

Computer Science Theses

The QoS Steiner Tree Problem asks for the most cost efficient way to multicast multimedia to a heterogeneous collection of users with different data consumption rates. We assume that the cost of using a link is not constant but rather depends on the maximum bandwidth routed through the link. Formally, given a graph with costs on the edges, a source node and a set of terminal nodes, each one with a bandwidth requirement, the goal is to find a Steiner tree containing the source, and the cheapest assignment of bandwidth to each of its edges so that each source-to-terminal path …


Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal Dec 2006

Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal

Computer Science Theses

Comparing protein sequences is an essential procedure that has many applications in the field of bioinformatics. The recent advances in computational capabilities and algorithm design, simplified the comparison procedure of protein sequences from several databases. Various algorithms have emerged using state of the art approaches to match protein sequences based on structural and functional properties of the amino acids. The matching involves structural alignment, and this alignment may be global; comprising of the whole length of the protein, or local; comprising of the sub-sequences of the proteins. Families of related proteins are found by clustering sequence alignments. The frequency distributions …


Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi Dec 2006

Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi

Computer Science Theses

The growth of wireless telecommunications has stipulated the interest for anywhere-anytime computing. The synergy between networking and mobility will engender new collaborative applications with mobile devices on heterogeneous platforms. One such middleware is “SYSTEM ON MOBILE DEVICES”, SYD developed by the Yamacraw Embedded Systems research team. This type of middleware is an opening step towards Peer-to-Peer mobile networks. This project envisioned collaborative applications among mobile devices and PDAs were used as servers. This thesis studies various existing architectures in mobile computing and their scalability issues. We also proposed new scalable flexible thick client proxy system FTCPS, an architecture suitable for …


An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju Dec 2006

An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju

Computer Science Theses

A multidatabase system (MDBMS) is a facility that allows users to access data located in multiple autonomous database management systems (DBMSs) at different sites. To ensure global atomicity for multidatabase transactions, a reliable global atomic commitment protocol is a possible solution. In this protocol a centralized transaction manager (TM) receives global transactions, submits subtransactions to the appropriate sites via AGENTS. An AGENT is a component of MDBS that runs on each site; AGENTS after receiving subtransactions from the transaction manager perform the transaction and send the results back to TM. We have presented a unique proof-of-concept, a JAVA application for …


Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang Dec 2006

Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang

Computer Science Theses

Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our method is based on research in cognitive psychology along with characteristics found in a majority of …


64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan Dec 2006

64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan

Computer Science Theses

ABSTRACT Due to the rapid progress in the field of VLSI, improvements in speed, power and area are quite evident. Research and development in this field are motivated by growing markets of portable mobile devices such as personal multimedia players, cellular phones, digital camcorders and digital cameras. Among the recently popular logic families, pass transistor logic is promising for low power applications as compared to conventional static CMOS because of lower transistor count. This thesis proposes four novel designs for Booth encoder and selector logic using pass logic principles. These new designs are implemented and used to build a 64 …


A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta Dec 2006

A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta

Computer Science Theses

In this thesis, we characterize the proprietary active scanning algorithm of several wireless network interface cards. Our experiments are the first of its kind to observe the complete scanning process as the wireless network interface cards probe all the channels in the 2.4GHz spectrum. We discuss the: 1) correlation of channel popularity during active scanning and access point channel deployment popularity; 2) number of probe request frames statistics on each channel; 3) channel probe order; and 4) dwell time. The knowledge gained from characterizing wireless network interface cards is important for the following reasons: 1) it helps one understand how …