Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Alignment-Free Methods And Its Applications, Ramez Mina Dec 2011

Alignment-Free Methods And Its Applications, Ramez Mina

Student Work

Comparing biological sequences remains one of the most vital activities in Bioinformatics. Comparing biological sequences would address the relatedness between species, and find similar structures that might lead to similar functions.

Sequence alignment is the default method, and has been used in the domain for over four decades. It gained a lot of trust, but limitations and even failure has been reported, especially with the new generated genomes. These new generated genomes have bigger size, and to some extent suffer errors. Such errors come mainly as a result from the sequencing machine. These sequencing errors should be considered when submitting …


Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal Dec 2011

Application Oriented Analysis Of Large Scale Datasets, Prashant Shivaji Paymal

Student Work

Diverse application areas, such as social network, epidemiology, and software engineering consist of systems of objects and their relationships. Such systems are generally modeled as graphs. Graphs consist of vertices that represent the objects, and edges that represent the relationships between them. These systems are data intensive and it is important to correctly analyze the data to obtain meaningful information. Combinatorial metrics can provide useful insights for analyzing these systems. In this thesis, we use the graph based metrics such as betweenness centrality, clustering coefficient, articulation points, etc. for analyzing instances of large change in evolving networks (Software Engineering), and …


Using Semantic Templates To Study Vulnerabilities Recorded In Large Software Repositories, Yan Wu Oct 2011

Using Semantic Templates To Study Vulnerabilities Recorded In Large Software Repositories, Yan Wu

Student Work

Software vulnerabilities allow an attacker to reduce a system's Confidentiality, Availability, and Integrity by exposing information, executing malicious code, and undermine system functionalities that contribute to the overall system purpose and need. With new vulnerabilities discovered everyday in a variety of applications and user environments, a systematic study of their characteristics is a subject of immediate need for the following reasons:

  • The high rate in which information about past and new vulnerabilities are accumulated makes it difficult to absorb and comprehend.
  • Rather than learning from past mistakes, similar types of vulnerabilities are observed repeatedly.
  • As the scale and complexity of …


An Investigation Of Microenterprise Capability-Building Via Access And Use Of Technology, Travis Godwin Good Jul 2011

An Investigation Of Microenterprise Capability-Building Via Access And Use Of Technology, Travis Godwin Good

Student Work

Micro-enterprises (businesses with one to five employees) lie at the heart of the American economy but are not well-researched. It is believed that technology adoption has the potential to spark strong growth among micro-enterprises, but current technology adoption models are tailored for large businesses and do not consider the human, social, and economic inputs peculiar to micro-enterprises. This research investigates how access to, and use of technology may lead micro enterprises to build capabilities that will help them increase their net income and hire more employees. Framed as a specification of Amartya Sen’s capability perspective, this research seeks, through a …


Multi-Robot Coalition Formation For Distributed Area Coverage, Ke Cheng Jun 2011

Multi-Robot Coalition Formation For Distributed Area Coverage, Ke Cheng

Student Work

The problem of distributed area coverage using multiple mobile robots is an important problem in distributed multi-robot sytems. Multi-robot coverage is encountered in many real world applications, including unmanned search & rescue, aerial reconnaissance, robotic demining, inspection of engineering structures, and automatic lawn mowing. To achieve optimal coverage, robots should move in an efficient manner and reduce repeated coverage of the same region that optimizes a certain performance metric such as the amount of time or energy expended by the robots. This dissertation especially focuses on using mini-robots with limited capabilities, such as low speed of the CPU and limited …


Wopr In Search Of Better Strategies For Board Games, Ben Horner May 2011

Wopr In Search Of Better Strategies For Board Games, Ben Horner

Student Work

Board games have been challenging intellects and capturing imaginations for more than five thousand years. Researchers have been producing artificially intelligent players for more than fifty. Common artificial intelligence techniques applied to board games use alpha-beta pruning tree search techniques. This paper supplies a frame- work that accommodates many of the diverse aspects of board games, as well as exploring several alternatives for searching out ever better strategies. Techniques examined include optimizing artificial neural networks using genetic algorithms and backpropagation.


Semantic Relevance Analysis Of Subject-Predicate-Object (Spo) Triples, Ranjana Kumar Apr 2011

Semantic Relevance Analysis Of Subject-Predicate-Object (Spo) Triples, Ranjana Kumar

Student Work

The goal of this thesis is to explore and integrate several existing measurements for ranking the relevance of a set of subject-predicate-object (SPO) triples to a given concept. As we are inundated with information from multiple sources on the World-Wide-Web, SPO similarity measures play a progressively important role in information extraction, information retrieval, document clustering and ontology learning. This thesis is applied in the Cyber Security Domain for identifying and understanding the factors and elements of sociopolitical events relevant to cyberattacks. Our efforts are towards developing an algorithm that begins with an analysis of news articles by taking into account …


Dynamic Reconfiguration In Modular Self-Reconfigurable Robots Using Multi-Agent Coalition Games, Zachary Ramaekers Apr 2011

Dynamic Reconfiguration In Modular Self-Reconfigurable Robots Using Multi-Agent Coalition Games, Zachary Ramaekers

Student Work

In this thesis, we consider the problem of autonomous self-reconfiguration by modular self-reconfigurable robots (MSRs). MSRs are composed of small units or modules that can be dynamically configured to form different structures, such as a lattice or a chain. The main problem in maneuvering MSRs is to enable them to autonomously reconfigure their structure depending on the operational conditions in the environment. We first discuss limitations of previous approaches to solve the MSR self-reconfiguration problem. We will then present a novel framework that uses a layered architecture comprising a conventional gait table-based maneuver to move the robot in a fixed …