Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Physical Sciences and Mathematics

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


Simulation Of Online Bin Packing In Practice, Kalpana Rajagopal Dec 2016

Simulation Of Online Bin Packing In Practice, Kalpana Rajagopal

UNLV Theses, Dissertations, Professional Papers, and Capstones

The bin packing problem requires packing a set of objects into a finite number of bins of fixed capacity in a way that minimizes the number of bins used. We consider the online version of the problem where items arrive over tine and a decision has to be made as soon as an element is available. Online algorithms can be analyzed in terms of competitiveness, a measure of performance that compares the solution obtained online with the optimal offline solution for the same problem, where the lowest possible competitiveness is best. Online processing is difficult due to the fact that …


A Case Study On Enterprise Content Management Using Agile Methodology, Rohit Raj Dec 2016

A Case Study On Enterprise Content Management Using Agile Methodology, Rohit Raj

UNLV Theses, Dissertations, Professional Papers, and Capstones

Every organization has the need to create, classify, manage and archive information so that it is accessible when they need it. The amount of data or information needed for an organization to build their business and for them to be more positive in today’s business world is increasing exponentially, which also includes unstructured data or unstructured content. It is not appropriate only to “manage” content, but whether the correct version of the data or document or record can be accessed. Enterprise Content Management is an efficient collection and planning of information that is to be used by a very particular …


Enhancing The Draft Assembly With Minhash, Saju Varghese Dec 2016

Enhancing The Draft Assembly With Minhash, Saju Varghese

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we report on the use of minhash techniques to improve the draft assembly of a genome mapping. More specifically, we use minhash to compare the scaffolds of sea urchin and sea cucumber genomes.

One of the main contributions of this thesis is the implementation of minhash with the Message Passing Interface (MPI) utilizing Intel Phi co-processors. It is shown that our implementation significantly reduces the processing time for identification of k-mer similarities.


Improvement Of Security In Uas Communication And Navigation Using Ads-B, Vedadatta Gouripeddi Dec 2016

Improvement Of Security In Uas Communication And Navigation Using Ads-B, Vedadatta Gouripeddi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we congregate the security threats on UAS and suggest solutions using ADS-B device. UAS ground and intercommunication is prone to availability, confidentiality and integrity attacks. UAS communication has three layered wireless Ad-Hock network which comprises of Complex group key exchange. Loss of one layer in the Ad-hock network leads to a complete loss of communication in the network. Current UAS navigation methods include complete reliance on on-board sensors, radars and GPS. This research proposes solutions for UAS communication, navigation and collision avoidance using ADS-B. ADS-B acts as a back-up when there is a loss in any one …


Acoustic Detection, Source Separation, And Classification Algorithms For Unmanned Aerial Vehicles In Wildlife Monitoring And Poaching, Carlo Lopez-Tello Dec 2016

Acoustic Detection, Source Separation, And Classification Algorithms For Unmanned Aerial Vehicles In Wildlife Monitoring And Poaching, Carlo Lopez-Tello

UNLV Theses, Dissertations, Professional Papers, and Capstones

This work focuses on the problem of acoustic detection, source separation, and classification under noisy conditions. The goal of this work is to develop a system that is able to detect poachers and animals in the wild by using microphones mounted on unmanned aerial vehicles (UAVs). The classes of signals used to detect wildlife and poachers include: mammals, birds, vehicles and firearms. The noise signals under consideration include: colored noises, UAV propeller and wind noises.

The system consists of three sub-systems: source separation (SS), signal detection, and signal classification. Non-negative Matrix Factorization (NMF) is used for source separation, and random …


Novel Non-Blocking Approach For A Concurrent Heap, Rashmi Niyolia Dec 2016

Novel Non-Blocking Approach For A Concurrent Heap, Rashmi Niyolia

UNLV Theses, Dissertations, Professional Papers, and Capstones

We present a non-blocking algorithm for a concurrent heap in asynchronous shared memory multiprocessors. Processors in these machines often execute instructions at varying speeds and are subject to arbitrarily long delays. Our implementation supports Non-blocking Insert, Delete, and Find-Min operations on a heap. Non-blocking techniques avoid the drawbacks associated with mutual exclusion and also admit improved parallelism. Insert and DeleteMin operations in heap take more than one atomic instruction to complete, thus, it is possible that a new operation may be started before the previous one completes, leaving heap inconsistent between operations. We have represented heap as an array of …


The Jvmcsp Runtime And Code Generator For Processj In Java, Cabel Dhoj Shrestha Aug 2016

The Jvmcsp Runtime And Code Generator For Processj In Java, Cabel Dhoj Shrestha

UNLV Theses, Dissertations, Professional Papers, and Capstones

The modern day advancements in multi-core technologies require programmers to use the right tools and languages to fully harness their potentials. On that front, our endeavor lies in developing a new multipro- cessing programming language. Concurrent or parallel programs can be hard to get right because of locks, monitors, mutexes, etc. One solution is using a CSP based process-oriented language. Process-oriented programming alleviates many of the problems found in thread and lock programming by proper encapsu- lation of data, explicit synchronous message passing, and the ability to verify code to be free of deadlocks and livelocks by using tools like …


Empirical Study Of Concurrent Programming Paradigms, Patrick M. Daleiden May 2016

Empirical Study Of Concurrent Programming Paradigms, Patrick M. Daleiden

UNLV Theses, Dissertations, Professional Papers, and Capstones

Various concurrent programming paradigms have been proposed by language designers in an effort to simplify some of the unique constructs required to handle concurrent programming tasks. Despite these different approaches, however, there has been no general clear winner accepted by software developers and different paradigms are regarded to have strengths and weaknesses in certain areas. This thesis was motivated by the desire to investigate the question of whether or not there are measurable differences between two widely differing paradigms for concurrent programming: Threads vs. Communicating Sequential Processes. The mechanism for observing and comparing these paradigms was a randomized controlled trial …


Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar May 2016

Efficient Algorithms For Clustering Polygonal Obstacles, Sabbir Kumar Manandhar

UNLV Theses, Dissertations, Professional Papers, and Capstones

Clustering a set of points in Euclidean space is a well-known problem having applications in pattern recognition, document image analysis, big-data analytics, and robotics. While there are a lot of research publications for clustering point objects, only a few articles have been reported for clustering a given distribution of obstacles. In this thesis we examine the development of efficient algorithms for clustering a given set of convex obstacles in the 2D plane. One of the methods presented in this work uses a Voronoi diagram to extract obstacle clusters. We also consider the implementation issues of point/obstacle clustering algorithms.


A Study On Automated Process For Extracting White Blood Cellular Data From Microscopic Digital Injured Skeletal Muscle Images, Bibek Karki May 2016

A Study On Automated Process For Extracting White Blood Cellular Data From Microscopic Digital Injured Skeletal Muscle Images, Bibek Karki

UNLV Theses, Dissertations, Professional Papers, and Capstones

Skeletal muscle injury is one of the common injuries caused by high-intensity sports activities, military related works, and natural disasters. In order to discover better therapies, it is important to study muscle regeneration process. Muscle regeneration process tracking is the act of monitoring injured tissue section over time, noting white blood cell behavior and cell-fiber relations. A large number of microscopic images are taken for tracking muscle regeneration process over multiple time instances. Currently, manual approach is widely used to analyze a microscopic image of muscle cross section, which is time consuming, tedious and buggy.

Automation of this research methodology …


Security Threats From Uas And Its Mitigation Through Detection And Tracking, Sai Ram Ganti May 2016

Security Threats From Uas And Its Mitigation Through Detection And Tracking, Sai Ram Ganti

UNLV Theses, Dissertations, Professional Papers, and Capstones

Unmanned Aerial Systems (UAS) are being used commonly for surveillance, providing valuable video data and reducing risk for humans wherever applicable. The cost of small UAS can range from as low as $30 to high as $5000, which makes it affordable by everyone. Most of the UAS are equipped with a camera which results in activities like disruption of privacy or capturing sensitive data. This research is aimed at developing a system which can detect and identify a drone and apply some counter measures to stop its functions or make it go away. The air traffic will increase significantly in …


A Simulator Application For Distributed Leader Election Algorithms, Sugeeswara Gurudeniya May 2016

A Simulator Application For Distributed Leader Election Algorithms, Sugeeswara Gurudeniya

UNLV Theses, Dissertations, Professional Papers, and Capstones

We present an application program, Distributed Algorithm Simulator, to simulate the execution of distributed leader election algorithms in a ring-network. The application was developed using Visual C# on Microsoft .NET Framework 4.5. The Distributed Algorithm Simulator consists of two major components: A Visual Simulator, which visually demonstrates the execution of the algorithms; and a Textual Simulator, which simulates the execution in text format. In both cases the end-result can be saved to a file.

The Visual Simulator displays the network in a ring orientation with circles representing the nodes, and numbers on them showing the node IDs. The user has …


Algorithms For Monotone Paths With Visibility Properties, Bikash Lama Bamjan May 2016

Algorithms For Monotone Paths With Visibility Properties, Bikash Lama Bamjan

UNLV Theses, Dissertations, Professional Papers, and Capstones

Constructing collision-free paths in Euclidean space is a well-known problem in computational geometry having applications in many fields that include robotics, VLSI, and covert surveillance. In this thesis, we investigate the development of efficient algorithms for constructing a collision-free path that satisfies directional and visibility constraints. We present algorithms for constructing monotone collision-free paths that tend to maximize the visibility of the boundary of obstacles. We also present implementation of some monotone path planning algorithms in Java Programming Language.


Analysis Of Power-Down Systems With Five States, Govind Pathak May 2016

Analysis Of Power-Down Systems With Five States, Govind Pathak

UNLV Theses, Dissertations, Professional Papers, and Capstones

We consider a device, which has states ON, OFF and fixed number of intermediate states.In the ON state the device uses full power whereas in the OFF state the device consumes no energy but a constant cost is associated with switching back to ON. Intermediate states use some fraction of energy proportional to the usage time but switching back to the ON state has a constant setup cost depending on the current state. Such systems are widely used to conserve energy, for example to speed scale CPUs, to control data centers, or to manage renewable energy.

We analyze such a …


A Web-Based Solution For Small Unmanned Aircraft System (Suas) Traffic Management, Monetta Angelique Shaw May 2016

A Web-Based Solution For Small Unmanned Aircraft System (Suas) Traffic Management, Monetta Angelique Shaw

UNLV Theses, Dissertations, Professional Papers, and Capstones

There is currently no system in place for safely managing small unmanned aircraft systems (UAS). Small UAS (sUAS) pose a safety hazard to both manned aircraft and people on the ground. The initial solution to this problem proposed in this paper is a system that consists of a web server and an Android mobile application (app). In this solution, the server is only accessible through the Android mobile app. After evaluating the initial solution, we determine that the system in this solution would be unable to quickly adjust to changes in technology and in the sUAS industry. To solve this …


A Web Based User Interface For Machine Learning Analysis Of Health And Education Data, Chandani Shrestha May 2016

A Web Based User Interface For Machine Learning Analysis Of Health And Education Data, Chandani Shrestha

UNLV Theses, Dissertations, Professional Papers, and Capstones

The objective of this thesis is to develop a user friendly web application that will be used to analyse data sets using various machine learning algorithms. The application design follows human computer interaction design guidelines and principles to make a user friendly interface [Shn03]. It uses Linear Regression, Logistic Regression, Backpropagation machine learning algorithms for prediction. This application is built using Java, Play framework, Bootstrap and IntelliJ IDE. Java is used in the backend to create a model that maps the input and output data based on any of the above given learning algorithms while Play Framework and Bootstrap are …


An Empirical Study On The Impact Of C++ Lambdas And Programmer Experience, Phillip Merlin Uesbeck May 2016

An Empirical Study On The Impact Of C++ Lambdas And Programmer Experience, Phillip Merlin Uesbeck

UNLV Theses, Dissertations, Professional Papers, and Capstones

Lambda functions have become prevalent in mainstream programming languages, as they are increasingly introduced to widely used object oriented programming languages such as Java and C++. Some in the scientific literature argue that this feature increases programmer productivity, ease of reading, and makes parallel programming easier. Others are less convinced, citing concerns that the use of lambdas makes debugging harder. This thesis describes the design, execution and results of an experiment to test the impact of using lambda functions compared to the iterator design pattern for iteration tasks, as a first step

in evaluating these claims. The approach is a …


Mining Unstructured Log Messages For Security Threat Detection, Candace Suh-Lee May 2016

Mining Unstructured Log Messages For Security Threat Detection, Candace Suh-Lee

UNLV Theses, Dissertations, Professional Papers, and Capstones

As computers become larger, more powerful, and more connected, many challenges arise in implementing and maintaining a secure computing environment. Some of the challenges come from the exponential increase of unstructured messages generated by the computer systems and applications. Although these data contain a wealth of information that is useful for advanced threat detection and prediction for future anomalies, the sheer volume, variety, and complexity of data make it difficult for even well-trained analysts to extract the right information. While conventional SIEM (Security Information and Event Management) tools provide some capability to collect, correlate, and detect certain events from structured …


Top-K Nodes Identification In Big Networks Based On Topology And Activity Analysis, Sweta Gurung May 2016

Top-K Nodes Identification In Big Networks Based On Topology And Activity Analysis, Sweta Gurung

UNLV Theses, Dissertations, Professional Papers, and Capstones

Graphs and Networks have been the most researched topics with applications ranging from theoretical to practical fields, such as social media, genetics, and education. In many competitive environments, the most productive activities may be interacting with high-profile people, reading a much-cited article, or researching a wide range of fields such as the study on highly connected proteins. This thesis proposes two methods to deal with top-K nodes identification: centrality-based and activity-based methods for identifying top-K nodes. The first method is based on the topological structure of the network and uses the centrality measure called Katz Centrality; a path based ranking …


Parallel Static Object Detection, Tirambad Shiwakoti May 2016

Parallel Static Object Detection, Tirambad Shiwakoti

UNLV Theses, Dissertations, Professional Papers, and Capstones

The need for parallelism is growing with the broadening of computing in the real world where computing is an integral part of any field. In the early days of computing, adding transistors to the CPU could solve computation complexity. This is not the case now, where we can no longer advance the hardware capabilities at the pace of the advancement of computing problems. One of the fields which is intensive in computation is image processing. If it were just for one frame of an image, we could cope with the computation overhead. When the need is to compute video frames, …