Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Caver Quest 3d Virtual Cave Simulation Of Snowy River In Fort Stanton Cave, Ronald J. Lipinski, Pete Lindsley Nov 2013

Caver Quest 3d Virtual Cave Simulation Of Snowy River In Fort Stanton Cave, Ronald J. Lipinski, Pete Lindsley

National Cave and Karst Management Symposium 2013

Virtual worlds, or 3D simulations through which an avatar can travel, is becoming a common means to display products or provide training in new environments. This paper describes the steps in producing the 3D virtual simulation of Snowy River in Fort Stanton Cave, New Mexico. A traditional cave survey and map with cross sections was used to produce a 3D meshed surface of the cave walls using the Blender software package. Photographs were taken of the walls, ceiling, and floor and merged together. The merged montage was applied to the 3D mesh walls as a “texture”. Unity3D was used to …


Delta Encoding Based Methods To Reduce The Size Of Smartphone Application Updates, Nikolai Samteladze Jan 2013

Delta Encoding Based Methods To Reduce The Size Of Smartphone Application Updates, Nikolai Samteladze

USF Tampa Graduate Theses and Dissertations

In 2012 the two biggest smartphone application markets - the Google Play store and the Apple App Store - each had close to 700 thousand applications with approximately 2 billion downloads happening every month. The introduction of new features and correction of bugs and security vulnerabilities make it usual for mobile application developers to release new version of an application every month. Combined with the great smartphone popularity, it leads to approximately 400 PB annual traffic generated by app updates in the U.S. wireless networks alone. Being partially transmitted through cellular networks, mobile application updates traffic accounts to up to …


Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh Jan 2013

Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh

USF Tampa Graduate Theses and Dissertations

Regardless all the advantages of MPs, it has not reach the sizable customer base. In this paper, we examined the core drivers of using mobile payments (MPs) in restaurant industry from the consumers' perspective. Based on the Technology Acceptance Model (TAM), we developed a six factor model to reveal the determinants of consumers' intention to use MPs in restaurant. Security, subjective norm, compatibility with lifestyle, and previous experience with MPs were added to the traditional two factor TAM model (usefulness and ease of use). 300 respondents were recruited from an online survey agency and 258 valid responses were included in …


Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish Jan 2013

Robotic Swarming Without Inter-Agent Communication, Daniel Jonathan Standish

USF Tampa Graduate Theses and Dissertations

Many physical and algorithmic swarms utilize inter-agent communication to achieve advanced swarming behaviors. These swarms are inspired by biological swarms that can be seen throughout nature and include bee swarms, ant colonies, fish schools, and bird flocks. These biological swarms do not utilize inter-agent communication like their physical and algorithmic counterparts. Instead, organisms in nature rely on a local awareness of other swarm members that facilitates proper swarm motion and behavior. This research aims to pursue an effective swarm algorithm using only line-of-sight proximity information and no inter-agent communication. It is expected that the swarm performance will be lower than …


Automatic Identification Of Points Of Interest In Global Navigation Satellite System Data: A Spatial Temporal Approach, Khoa Anh Tran Jan 2013

Automatic Identification Of Points Of Interest In Global Navigation Satellite System Data: A Spatial Temporal Approach, Khoa Anh Tran

USF Tampa Graduate Theses and Dissertations

In addition to the emergence of smartphones and tablets in recent years, the rise of Global Navigation Satellite Systems (GNSS) has allowed mobile tracking applications to become popular and be put into many uses. Analyzing tracking records to identify points of interest (POIs) is useful for both prediction applications and research such as human behavior analysis, transportation planning, and especially travel surveys. Past research in travel surveys has shown that a GPS mobile phone-based survey is a useful tool for collecting information about individuals. Moreover, a passive travel survey collection is preferred to an active travel survey method by the …


Computational Approaches For Structure Based Drug Design And Protein Structure-Function Prediction, Sai Lakshmana Kumar Vankayala Jan 2013

Computational Approaches For Structure Based Drug Design And Protein Structure-Function Prediction, Sai Lakshmana Kumar Vankayala

USF Tampa Graduate Theses and Dissertations

This dissertation thesis consists of a series of chapters that are interwoven by solving interesting biological problems, employing various computational methodologies. These techniques provide meaningful physical insights to promote the scientific fields of interest. Focus of chapter 1 concerns, the importance of computational tools like docking studies in advancing structure based drug design processes. This chapter also addresses the prime concerns like scoring functions, sampling algorithms and flexible docking studies that hamper the docking successes. Information about the different kinds of flexible dockings in terms of accuracy, time limitations and success studies are presented. Later the importance of Induced fit …


An Application Developed For Simulation Of Electrical Excitation And Conduction In A 3d Human Heart, Di Yu Jan 2013

An Application Developed For Simulation Of Electrical Excitation And Conduction In A 3d Human Heart, Di Yu

USF Tampa Graduate Theses and Dissertations

This thesis first reviews the history of General Purpose computing Graphic Processing Unit (GPGPU) and then introduces the fundamental problems that are suitable for GPGPU algorithm. The architecture of GPGPU is compared against modern CPU architecture, and the fundamental difference is outlined. The programming challenges faced by GPGPU and the techniques utilized to overcome these issues are evaluated and discussed.

The second part of the thesis presents an application developed with GPGPU technology to simulate the electrical excitation and conduction in a 3D human heart model based on cellular automata model. The algorithm and implementation are discussed in detail and …


Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang Jan 2013

Algorithms And Data Structures For Efficient Timing Analysis Of Asynchronous Real-Time Systems, Yingying Zhang

USF Tampa Graduate Theses and Dissertations

This thesis presents a framework to verify asynchronous real-time systems based on model checking. These systems are modeled by using a common modeling formalism named Labeled Petri-nets(LPNs).

In order to verify the real-time systems algorithmically, the zone-based timing analysis method is used for LPNs. It searches the state space with timing information (represented by zones). When there is a high degree of concurrency in the model, firing concurrent enabled transitions in different order may result in different zones, and these zones may be combined without affecting the verification result. Since the zone-based method could not deal with this problem efficiently, …


Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes Jan 2013

Determining The Benefit Of Human Input In Human-In-The-Loop Robotic Systems, Christine Elizabeth Bringes

USF Tampa Graduate Theses and Dissertations

This work analyzes human-in-the-loop robotic systems to determine where human input can be most beneficial to a collaborative task. This is accomplished by implementing a pick-and-place task using a human-in-the-loop robotic system and determining which segments of the task, when replaced by human guidance, provide the most improvement to overall task performance and require the least cognitive effort.

The first experiment entails implementing a pick and place task on a commercial robotic arm. Initially, we look at a pick-and-place task that is segmented into two main areas: coarse approach towards a goal object and fine pick motion. For the fine …


Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar Jan 2013

Human Intention Recognition Based Assisted Telerobotic Grasping Of Objects In An Unstructured Environment, Karan Hariharan Khokar

USF Tampa Graduate Theses and Dissertations

In this dissertation work, a methodology is proposed to enable a robot to identify an object to be grasped and its intended grasp configuration while a human is teleoperating a robot towards the desired object. Based on the detected object and grasp configuration, the human is assisted in the teleoperation task. The environment is unstructured and consists of a number of objects, each with various possible grasp configurations. The identification of the object and the grasp configuration is carried out in real time, by recognizing the intention of the human motion. Simultaneously, the human user is assisted to preshape over …


Accelerated Fuzzy Clustering, Jonathon Karl Parker Jan 2013

Accelerated Fuzzy Clustering, Jonathon Karl Parker

USF Tampa Graduate Theses and Dissertations

Clustering algorithms are a primary tool in data analysis, facilitating the discovery of groups and structure in unlabeled data. They are used in a wide variety of industries and applications. Despite their ubiquity, clustering algorithms have a flaw: they take an unacceptable amount of time to run as the number of data objects increases. The need to compensate for this flaw has led to the development of a large number of techniques intended to accelerate their performance. This need grows greater every day, as collections of unlabeled data grow larger and larger. How does one increase the speed of a …


Fpca Based Human-Like Trajectory Generating, Wei Dai Jan 2013

Fpca Based Human-Like Trajectory Generating, Wei Dai

USF Tampa Graduate Theses and Dissertations

This thesis presents a new human-like upper limb and hand motion generating method. The work is based on Functional Principal Component Analysis and Quadratic Programming. The human-like motion generating problem is formulated in a framework of minimizing the difference of the dynamic profile of the optimal trajectory and the known types of trajectory. Statistical analysis is applied to the pre-captured human motion records to work in a low dimensional space. A novel PCA FPCA hybrid motion recognition method is proposed. This method is implemented on human grasping data to demonstrate its advantage in human motion recognition. One human grasping hierarchy …


Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar Jan 2013

Efficient And Private Processing Of Analytical Queries In Scientific Datasets, Anand Kumar

USF Tampa Graduate Theses and Dissertations

Large amount of data is generated by applications used in basic-science research and development applications. The size of data introduces great challenges in storage, analysis and preserving privacy. This dissertation proposes novel techniques to efficiently analyze the data and reduce storage space requirements through a data compression technique while preserving privacy and providing data security.

We present an efficient technique to compute an analytical query called spatial distance histogram (SDH) using spatiotemporal properties of the data. Special spatiotemporal properties present in the data are exploited to process SDH efficiently on the fly. General purpose graphics processing units (GPGPU or just …


Do Personality Tests Have A Place In Academic Preparation Of Undergradute Hospitality Students, Gunce Malan Jan 2013

Do Personality Tests Have A Place In Academic Preparation Of Undergradute Hospitality Students, Gunce Malan

USF Tampa Graduate Theses and Dissertations

This is a descriptive study that poses the questions and discussion regarding use of personality tests in prediction of future job performance of the current undergraduate hospitality students. A gap exists between the perception of the skills and competencies of high performers and the perception of hospitality students (Berezina et al., 2011; Malan, Berezina & Cobanoglu, 2012). The purpose of this study is to investigate if personality tests will help in predicting the success of students in their preferred job setting as compared to current high performers (managers).

The use of personality tests increased substantially after 1988, when the government …


Toward More Composable Software-Security Policies: Tools And Techniques, Daniel Lomsak Jan 2013

Toward More Composable Software-Security Policies: Tools And Techniques, Daniel Lomsak

USF Tampa Graduate Theses and Dissertations

Complex software-security policies are dicult to specify, understand, and update. The

same is true for complex software in general, but while many tools and techniques exist

for decomposing complex general software into simpler reusable modules (packages, classes,

functions, aspects, etc.), few tools exist for decomposing complex security policies into simpler

reusable modules. The tools that do exist for modularizing policies either encapsulate

entire policies as atomic modules that cannot be decomposed or allow ne-grained policy

modularization but require expertise to use correctly.

This dissertation presents a policy-composition tool called PoliSeer [27, 26] and the

PoCo policy-composition software-security language. PoliSeer is …


Dynamic Processes In Network Goods: Modeling, Analysis And Applications, Arnut Paothong Jan 2013

Dynamic Processes In Network Goods: Modeling, Analysis And Applications, Arnut Paothong

USF Tampa Graduate Theses and Dissertations

The network externality function plays a very important role in the study of economic network industries. Moreover, the consumer group dynamic interactions coupled with network externality concept is going to play a dominant role in the network goods in the 21st century. The existing literature is stemmed on a choice of externality function with certain quantitative properties. The utility function coupled with the network externality function is used to investigate static properties of rational equilibrium. The aim of this work is to systematically initiate a development of quantitative effects of the concept of network externality and its influence on the …


Defining And Preventing Code-Injection Attacks, Donald Ray Jan 2013

Defining And Preventing Code-Injection Attacks, Donald Ray

USF Tampa Graduate Theses and Dissertations

This thesis shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it possible for attackers to circumvent existing mechanisms, by supplying code-injecting inputs that are not recognized as such. The flaws also make it possible for benign inputs to be treated as attacks. After describing these flaws in conventional definitions of code-injection attacks, this thesis proposes a new definition, which is based on whether the symbols input to an application get used as (normal-form) values in the application's output. Because values are already fully evaluated, they cannot be considered ``code'' when injected. This simple …


Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi Jan 2013

Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi

USF Tampa Graduate Theses and Dissertations

Electricity generation for Information and Communications Technology (ICT) contributes over 2% of the human-generated CO2 to the atmosphere. Energy costs are rapidly becoming the major operational expense for ICT and may soon dwarf capital expenses as software and hardware continue to drop in price. In this dissertation, three new approaches to achieving energy-proportional operation of network links and data servers are explored.

Ethernet is the dominant wireline communications technology for Internet connectivity. IEEE 802.3az Energy Efficient Ethernet (EEE) describes a Low Power Idle (LPI) mechanism for allowing Ethernet links to sleep. A method of coalescing packets to consolidate link idle …


Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh Jan 2013

Applications Of Agent Based Approaches In Business: A Three Essay Dissertation, Shankar Prawesh

USF Tampa Graduate Theses and Dissertations

The goal of this dissertation is to investigate the enabling role that agent based simulation plays in business and policy. The aforementioned issue has been addressed in this dissertation through three distinct, but related essays. The first essay is a literature review of different research applications of agent based simulation in various business disciplines, such as finance, economics, information systems, management, marketing and accounting. Various agent based simulation tools to develop computational models are discussed. The second essay uses an agent-based simulation approach to study important properties of the widely used most popular news recommender systems (NRS). This essay highlights …


Energy Efficient Context-Aware Framework In Mobile Sensing, Ozgur Yurur Jan 2013

Energy Efficient Context-Aware Framework In Mobile Sensing, Ozgur Yurur

USF Tampa Graduate Theses and Dissertations

The ever-increasing technological advances in embedded systems engineering, together with the proliferation of small-size sensor design and deployment, have enabled mobile devices (e.g., smartphones) to recognize daily occurring human based actions, activities and interactions. Therefore, inferring a vast variety of mobile device user based activities from a very diverse context obtained by a series of sensory observations has drawn much interest in the research area of ubiquitous sensing. The existence and awareness of the context provides the capability of being conscious of physical environments or situations around mobile device users, and this allows network services to respond proactively and intelligently …


Playing In Trelis Weyr: Investigating Collaborative Practices In A Dragons Of Pern Role-Play-Game Forum, Kathleen Marie Alley Jan 2013

Playing In Trelis Weyr: Investigating Collaborative Practices In A Dragons Of Pern Role-Play-Game Forum, Kathleen Marie Alley

USF Tampa Graduate Theses and Dissertations

This descriptive case study examined adolescents' and emerging adults' literate and social practices within the context of a role-play-game (RPG) forum, investigating the ways participants read and collaboratively composed within this space. As a researcher, I was interested in how this space functioned and how the interactions between members impacted their composing processes, with particular attention to the role of online spaces and popular culture in adolescents' motivation to engage in this forum. This study was guided by three research questions: (1) In what ways is Trelis Weyr, an RPG forum, organized as a virtual environment?; (2) In what ways, …


Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun Jan 2013

Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun

USF Tampa Graduate Theses and Dissertations

Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy

resources and also restricted by the ad-hoc network operational

environment. They pose unique challenges, due to limited power

supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …


Modeling State Transitions With Automata, Egor Dolzhenko Jan 2013

Modeling State Transitions With Automata, Egor Dolzhenko

USF Tampa Graduate Theses and Dissertations

Models based on various types of automata are ubiquitous in modern science. These models allow reasoning about deep theoretical questions and provide a basis for the development of efficient algorithms to solve related computational problems. This work discusses several types of automata used in such models, including cellular automata and mandatory results automata.

The first part of this work is dedicated to cellular automata. These automata form an important class of discrete dynamical systems widely used to model physical, biological, and chemical processes. Here we discuss a way to study the dynamics of one-dimensional cellular automata through the theory of …


Real-Time Map Manipulation For Mobile Robot Navigation, Carlos Favis Ezequiel Jan 2013

Real-Time Map Manipulation For Mobile Robot Navigation, Carlos Favis Ezequiel

USF Tampa Graduate Theses and Dissertations

Mobile robots are gaining increased autonomy due to advances in sensor and computing technology. In their current form however, robots still lack algorithms for rapid perception of objects in a cluttered environment and can benefit from the assistance of a human operator. Further, fully autonomous systems will continue to be computationally expensive and costly for quite some time. Humans can visually assess objects and determine whether a certain path is traversable, but need not be involved in the low-level steering around any detected obstacles as is necessary in remote-controlled systems. If only used for rapid perception tasks, the operator could …


Automatic Macro- And Micro-Facial Expression Spotting And Applications, Matthew Adam Shreve Jan 2013

Automatic Macro- And Micro-Facial Expression Spotting And Applications, Matthew Adam Shreve

USF Tampa Graduate Theses and Dissertations

Automatically determining the temporal characteristics of facial expressions has extensive application domains such as human-machine interfaces for emotion recognition, face identification, as well as medical analysis. However, many papers in the literature have not addressed the step of determining when such expressions occur. This dissertation is focused on the problem of automatically segmenting macro- and micro-expressions frames (or retrieving the expression intervals) in video sequences, without the need for training a model on a specific subset of such expressions. The proposed method exploits the non-rigid facial motion that occurs during facial expressions by modeling the strain observed during the elastic …


Effects Of Virtual Reality On The Cognitive Memory And Handgun Accuracy Development Of Law Enforcement Neophytes, Richard A. Wright Jan 2013

Effects Of Virtual Reality On The Cognitive Memory And Handgun Accuracy Development Of Law Enforcement Neophytes, Richard A. Wright

USF Tampa Graduate Theses and Dissertations

Abstract

The purpose of this research was to investigate the effects of virtual reality training on the development of cognitive memory and handgun accuracy by law enforcement neophytes. One hundred and six academy students from 6 different academy classes were divided into two groups, experimental and control. The experimental group was exposed to virtual reality training for a period of 8 hours. The control group was exposed to the traditional, non-interactive training that occurred on a gun range, also for a period of 8 hours. After exposing the groups to their respective training, a counter-balance technique was utilized to expose …