Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

2005

Institution
Keyword
Publication

Articles 1 - 30 of 286

Full-Text Articles in Physical Sciences and Mathematics

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall Dec 2005

Learning Successful Strategies In Repeated General-Sum Games, Jacob W. Crandall

Theses and Dissertations

Many environments in which an agent can use reinforcement learning techniques to learn profitable strategies are affected by other learning agents. These situations can be modeled as general-sum games. When playing repeated general-sum games with other learning agents, the goal of a self-interested learning agent is to maximize its own payoffs over time. Traditional reinforcement learning algorithms learn myopic strategies in these games. As a result, they learn strategies that produce undesirable results in many games. In this dissertation, we develop and analyze algorithms that learn non-myopic strategies when playing many important infinitely repeated general-sum games. We show that, in …


Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry Dec 2005

Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry

Electronic Theses and Dissertations

Users of high availability (HA) computing require systems that run continuously, with little or no downtime. Modern PCs address HA needs by monitoring operating system parameters such as voltage, temperature, and hard drive status in order to anticipate possible system failure. However, one modality for PC monitoring that has been underutilized is sound. The application described here uses wavelet theory to analyze sounds produced by PC hard drives during standard operation. When twenty-nine hard drives were tested with the application and the results compared with the drives' Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) data, the binomial distribution's low p-value of …


Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder Dec 2005

Using Prospect Theory To Investigate Decision-Making Bias Within An Information Security Context, Neil J. Schroeder

Theses and Dissertations

Information security is an issue that has increased in importance over the past decade. In this time both practitioner and academic circles have researched and developed practices and process to more effectively handle information security. Even with growth in these areas there has been little research conducted into how decision makers actually behave. This is problematic because decision makers in the Department of Defense have been observed exhibiting risk seeking behavior when making information security decisions that seemingly violate accepted norms. There are presently no models in the literature that provide sufficient insight into this phenomenon. This study used Prospect …


Conference Web Site Redesign, Steven M. Pisarski Dec 2005

Conference Web Site Redesign, Steven M. Pisarski

Regis University Student Publications (comprehensive collection)

Sustainable Resources was a non-profit organization based out of Boulder, CO that, at the time of this project hosted yearly conferences to help find solutions to world poverty. Although, the previous web site had a professional appearance, it was not meeting their needs with regards to usability, extensibility, and maintainability, as they had been forced to rely heavily on a transient volunteer IT labor base. The aim of this project was to address their functional and maintenance problems. The application's front-end was built in adherence to the Model -view-Controller (MVC) design pattern and implemented using the Jakarta Struts framework and …


Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson Dec 2005

Trust Broker: A Defense Against Identity Theft From Online Transactions, Michael George Edvalson

Theses and Dissertations

The proliferation of online services over the years has encouraged more and more people to participate in Internet activities. Many web sites request personal and sensitive information needed to deliver the desired service. Unfortunately, it is difficult to distinguish the sites that can be trusted to protect such information from those that cannot. Many attempts to make the Internet easier to use introduce new security and privacy problems. On the other hand, most attempts at creating a safe online environment produce systems that are cryptic and hard to use. The TrustBroker system is based on a specialized online repository that …


Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae Dec 2005

Industrial Technology Education Teachers Perceptions Of National Standards For Technological Literacy In The State Of Arizona, Allan R. Mcrae

Theses and Dissertations

Today, it is becoming increasingly clear that there is a growing interest, concern, and need for technological literacy. To this end, the International Technology Education Association (ITEA) through the Technology for All Americans Project, has developed and promulgated the Standards for Technological Literacy: Content for the Study of Technology. This effort is part of the ongoing initiative to develop technology standards on a national level, and to focus on what every student in grades K-12 should know and be able to do in order to achieve technological literacy (ITEA, 2000). The purpose of this study was to investigate the perceived …


The Cherry Creek Sneak A Database Solution, Analissa Hilt Dec 2005

The Cherry Creek Sneak A Database Solution, Analissa Hilt

Regis University Student Publications (comprehensive collection)

The purpose of the database was to provide a repository of information about the race, the racers, the sponsors and other miscellaneous information that may in the future prove to provide a better understanding of the customers of The Sneak. This project was completed with the long-term goals that the information contained in the database will be utilized to reduce registration time, recruit prior year participants to participate in future events and provide a tool to intimately understand the customers of the race.


High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai Dec 2005

High Performance Parallel Approximate Eigensolver For Real Symmetric Matrices, Yihua Bai

Doctoral Dissertations

In the first-principles calculation of electronic structures, one of the most timeconsuming tasks is that of computing the eigensystem of a large symmetric nonlinear eigenvalue problem. The standard approach is to use an iterative scheme involving the solution to a large symmetric linear eigenvalue problem in each iteration. In the early and intermediate iterations, significant gains in efficiency may result from solving the eigensystem to reduced accuracy. As the iteration nears convergence, the eigensystem can be computed to the required accuracy.
Traditional real symmetric eigensolvers compute the eigensystem in three steps: 1) reduce a dense matrix to a symmetric tridiagonal …


A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang Dec 2005

A Combined Routing Method For Ad Hoc Wireless Networks, Zhenhui Jiang

Dartmouth College Master’s Theses

To make ad hoc wireless networks adaptive to different mobility and traffic patterns, we studied in this thesis an approach to swap from one protocol to another protocol dynamically, while routing continues. By the insertion of a new layer, we were able to make each node in the ad hoc wireless network notify each other about the protocol swap. To ensure that routing works efficiently after the protocol swap, we initialized the destination routing protocol's data structures and reused the previous routing information to build the new routing table. We also tested our approach under different network topologies and traffic …


Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill Dec 2005

Implementation Of Coeus Grant Management Software At The Desert Research Institute, Patricia Kingsmill

Regis University Student Publications (comprehensive collection)

The Internet and electronic commerce have opened up new opportunities for efficiency in research administration. Public Law 106-107 or the Federal Financial Assistance Improvement Act signed on November 20, 1999 and the President's Management Agenda have formally charged federal grant-making agencies with creating a single electronic system to find and apply for federal grant opportunities. In response to this directive, recipient organizations will need the ability to electronically prepare and submit proposal information and receive funding data from the sponsoring agency. This project reviews the implementation of a software package, MIT's Coeus Grant Management System, as a solution to the …


Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele Dec 2005

Design Of North Texas Pc Users Group Ecommerce Interface And Online Membership System, Jeir J. Steele

Regis University Student Publications (comprehensive collection)

The North Texas PC Users Group is a non-profit that is struggling with their existing membership process. This thesis explores the analysis of a new membership process and discusses the resulting new architecture and system design to implement it. The implementation of this new business process will reduce the time to produce the standard monthly reports and foster future membership retention efforts. The new design supports Ecommerce instant transactions, online availability of reports for the Board of Directors, and the access control of a member-only online site. The research for this project included an analysis of the cost, benefits, and …


Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan Dec 2005

Robust And Efficient Localization Techniques For Cellular And Wireless Sensor Networks, Haseebulla M. Khan

Computer Science Theses & Dissertations

Localization in wireless networks refers to a collection of tasks that, collectively, determines the location of a mobile user, striving to hide the effects of mobility from the user and/or application. Localization has become an important issue and has drawn considerable attention, as many applications including E-911, cargo tracking, locating patients, location-sensitive billing, etc., require knowledge of the location of user/objects. It was realized, quite a while back, that extending emergency 911-like services (E-911) to continually growing mobile population is one of the extremely important localization applications. The bulk of the proposed solutions to emergency location management in wireless environments …


Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham Dec 2005

Obtaining High Precision Results From Low Precision Hardware, Adam Donald Graham

Masters Theses

This document describes an attempt at acheiving high precision matrix multiplication results from the Lenslet EnLight256 Optical Signal Processor (OSP), which on its own can only produce results which are hardware limited to 8-bit signed integers. Due to it’s low precision, it’s has only limited applicability to real world problems, and if higher precision results were possible from the machine it could be used for more applications. A C library is developed for this thesis to allow high-precision results from the EnLight256. The library is described and results are given. Finally an implementation of the Jacobi Method on the EnLight256 …


Online Support For Multivariate Integration, Shujun Li Dec 2005

Online Support For Multivariate Integration, Shujun Li

Dissertations

In this dissertation, we present an online problem solving environment for multivariate numerical integration. To build an environment for users with various backgrounds, we address issues of Web interface support for end-users, remote application programming interfaces for distributed system programmers, visualization of multivariate integrand functions for problem analysis, and highly efficient integration methods. Compared to previous implementations, our new load balancing schemes increase the scalability of parallel integration and hence are suitable for large scale computations. A parallel integration service, called PI service, was implemented based on Web services technologies to support both remote integration and remote visualization. The multivariate …


Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass Dec 2005

Developing A Strategic Is Plan For The Cherry Creek Sneak, Stephanie Bass

Regis University Student Publications (comprehensive collection)

The Cherry Creek Sneak is the 3rd largest 5-mile race in the United States.Currently, 10% of the proceeds from the race are donated to the ColoradoGovernor's Council to fight childhood obesity. The co-owners of the race, Pat Downing and Paula Tiernen, live in different states, and because of this, are unable to manage The Cherry Creak Sneak, or any business regarding the race efficiently. In order to continue the race in the future, they have requested that the Cherry Creek Sneak website be the place where their business is conducted. The goal of this project, therefore, is to create a …


Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi Dec 2005

Radar - A Novel Admission Control And Handoff Management Scheme For Multimedia Leo Satellite Networks, Syed Rashidali Rizvi

Computer Science Theses & Dissertations

Low Earth Orbit (LEO) satellite networks are deployed as an enhancement to terrestrial wireless networks in order to provide broadband services to users regardless of their location. In addition to global coverage, these satellite systems support communications with hand-held devices and offer low cost-per-minute access cost, making them promising platforms for Personal Communication Services (PCS). LEO satellites are expected to support multimedia traffic and to provide their users with some form of Quality of Service (QoS) guarantees. However, the limited bandwidth of the satellite channel, satellite rotation around the Earth and mobility of end-users makes QoS provisioning and mobility management …


Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant Dec 2005

Correlogram Method For Comparing Bio-Sequences, Gandhali P. Samant

Theses and Dissertations

Sequence comparison is one of the most primitive operations used in bio-informatics. It is used as a basis for many other complex manipulations in the field of Computational Molecular Biology. Many methods and algorithms were developed to compare and align sequences effectively. Most of these methods use linear comparison and some standard scoring schemes to calculate the similarity between sequences. We described an alternative approach to compare sequences based on the correlogram method. This method has already been used in the past for comparing images. By using the correlogram method, a sequence is projected on a 3-D space and the …


An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier Dec 2005

An Improvement And A Generalization Of Zippel's Sparse Multivariate Polynomial Interpolation Algorithm, Michael D. Brazier

Theses and Dissertations - UTB/UTPA

The algorithm most often used for the problem of interpolating sparse multivariate polynomials from their values is Zippel's probabilistic algorithm (1988). The algorithm evaluates the function to be interpolated at a significant number of points, and for many problems of interest processing evaluations dominates the running time. This thesis presents an improvement of Zippel's algorithm, which decreases the number of evaluations needed for an interpolation by using transposed Vandermonde systems for the univariate interpolation step of Zippel's algorithm. The technique also allows a more general form of the algorithm: it becomes possible to interpolate more than one variable within a …


Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan Dec 2005

Improving The Performance Of Nested Loop Algorithm Using Separators, Nachiappan N. Nachiappan

Theses and Dissertations - UTB/UTPA

This thesis studies the properties of distance-based outliers and a better detection method for large multi-dimensional datasets. Outlier detection is an important task to find out the objects that deviate in a high ratio from the rest of the objects. The proposed algorithm breaks the data set into divisions and sets the area of access for each division, thus reducing the unnecessary access for a major set of elements. This algorithm reduces the run time of the existing algorithm by using separators. Datasets of varying sizes have been tested to analyze the empirical values of these procedures. Effective data structures …


Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou Nov 2005

Generating Data-Extraction Ontologies By Example, Yuanqiu Zhou

Theses and Dissertations

Ontology-based data-extraction is a resilient web data-extraction approach. A major limitation of this approach is that ontology experts must manually develop and maintain data-extraction ontologies. The limitation prevents ordinary users who have little knowledge of conceptual models from making use of this resilient approach. In this thesis we have designed and implemented a general framework, OntoByE, to generate data-extraction ontologies semi-automatically through a small set of examples collected by users. With the assistance of a limited amount of prior knowledge, experimental evidence shows that OntoByE is capable of interacting with users to generate data-extraction ontologies for domains of interest to …


A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones Nov 2005

A Software Development Environment For Building Context-Aware Systems For Family Technology, Jeremiah Kenton Jones

Theses and Dissertations

The purpose of this thesis was to utilize existing technologies to create a development environment suitable for creating context-aware applications and systems specific to home and family living conditions. After outlining the history of context-aware applications and the challenges that face family-centric systems in this field, a development environment was implemented that solves the unique challenges that face application development for family-centric, context-aware applications. In particular, research cited in this document indicates that a browser-based user interface is the most appropriate interface for a family environment. The flexibility of the interface, as well as the familiarity of the application structure …


Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker Nov 2005

Generating Medical Logic Modules For Clinical Trial Eligibility, Craig G. Parker

Theses and Dissertations

Clinical trials are important to the advancement of medical science. They provide the experimental and statistical basis needed to determine the benefit of diagnostic and therapeutic agents and procedures. The more patients enrolled in a clinical trial, the more confidence we can have in the trial's results. However, current practices for identifying eligible patients can be expensive and time-consuming. To assist in making identification of eligible patients more cost effective, we have developed a system for translating the eligibility criteria for clinical trials to an executable form. This system takes as input the eligibility criteria for a trial formatted as …


Implementation Of Operational Framework In The Nlp (Based On Mof And Itil Standards), James Kapp Nov 2005

Implementation Of Operational Framework In The Nlp (Based On Mof And Itil Standards), James Kapp

Regis University Student Publications (comprehensive collection)

An operational framework, as proposed by the Microsoft Operational Framework (MOF) and the Information Technology Infrastructure Library (ITIL) provides a process model for controlling and managing Information Technology (IT) operations. With a strict focus on IT operations, it provides the processes and terminology to coordinate and integrate the functional elements of an IT department. The Systems Engineering and Applications Development (SEAD) practicum is composed of four main groups; Data Access, Network, Integrated Services and Development. This professional project will propose the beginning framework for overall operation and integration of the SEAD Practicum with an emphasis on service support and documentation. …


Verification Of Digital Controller Verifications, Xuan Wang Nov 2005

Verification Of Digital Controller Verifications, Xuan Wang

Theses and Dissertations

This thesis presents an analysis framework to verify the stablility property of a closed-loop control system with a software controller implementation. The usual approach to verifying stability for software uses experiments which are costly and can be dangerous. More recently, mathematical models of software have been proposed which can be used to reason about the correctness of controllers. However, these mathematical models ignore computational details that may be important in verification. We propose a method to determine the instability of a closed-loop system with a software controller implementation under l^2 inputs using simulation. This method avoids the cost of experimentation …


Real-Time Motion Transition By Example, Cameron Quinn Egbert Nov 2005

Real-Time Motion Transition By Example, Cameron Quinn Egbert

Theses and Dissertations

Motion transitioning is a common task in real-time applications such as games. While most character motions can be created a priori using motion capture or hand animation, transitions between these motions must be created by an animation system at runtime. Because of this requirement, it is often difficult to create a transition that preserves the feel that the actor or animator has put into the motion. An additional difficulty is that transitions must be created in real-time. This paper provides a method of creating motion transitions that is both computationally feasible for interactive speeds, and preserves the feel of the …


Course Development For A College Java Programming Class, Nathan Dodge Oct 2005

Course Development For A College Java Programming Class, Nathan Dodge

Regis University Student Publications (comprehensive collection)

This project documents the development of college-level curriculum for an Object Oriented Programming with Java course. The curriculum includes a set of lessons that students work through interactively. The lessons teach the fundamentals of object orientation. A goal of the project is to have students work with the same problem example throughout the entire set of lessons. Most texts on object orientation use several abstract examples which are used in a chapter or two of the text and are often not fully implemented. Each lesson of the project's curriculum presents an iteration of an evolving shape drawing application. Each lesson …


Development Of A Centralized Database System For Embracing Horses And The Urban Farm, April D. Hoskins Oct 2005

Development Of A Centralized Database System For Embracing Horses And The Urban Farm, April D. Hoskins

Regis University Student Publications (comprehensive collection)

Embracing Horses and The Urban Farm at Stapleton, is a nonprofit organization whose mission statement is to connect children from inner city neighborhoods to their natural environment, instilling a sense of respect, appreciation, and, ultimately responsibility for the plants and animals which share that space and a working knowledge of responsible stewardship of those plants and animals. To achieve this mission a paper based and generic database system have been utilized to record information pertaining to volunteers, financial donors, program offerings, and mailing distributions. These current systems no longer meet the needs of the organization, as the number of children …


Use Of Cross-Connect Clusters To Optimize Routing In Stm-64-Based Sdh Optical Network Systems, Bret William Durrett Oct 2005

Use Of Cross-Connect Clusters To Optimize Routing In Stm-64-Based Sdh Optical Network Systems, Bret William Durrett

Regis University Student Publications (comprehensive collection)

With the migration to Synchronous Digital Hierarchy, which uses the concept of logical rings, for backbone transmission systems, one of the major concerns that has been brought up repeatedly is a method in which to bring sub-rate circuits from one ring to another without having to decompose the entire backbone data stream to its individual circuits. This is critically important since the backbone data rate can be as high as 10 Gigabits per second or greater and may carry several thousand circuits, ranging in data rate from less than 2.4 Kilobits per second to 2.5 Gbps (STM-16). One potential means …


Implementing A Product Lifecycle Management Solution, Christopher M. Ray Oct 2005

Implementing A Product Lifecycle Management Solution, Christopher M. Ray

Regis University Student Publications (comprehensive collection)

Aviation Technology Group, Inc. (ATG) is currently preparing for a lengthy FAA certification process that will require detailed documentation and verification of the accuracy of all components that will belong to the aircraft being developed (the Javelin). This includes but is not limited to contracts, detailed design specifications, CAD files, test and verification results, revision tracking, and effectivity of all components used in each aircraft. The company has recently flown its first nonconforming prototype and will be building subsequent test articles, which will be used for the process of the Javelin. In order to organize all of this information and …


Gateway Battered Women's Services Website Development Project, Lena Alhusseini Oct 2005

Gateway Battered Women's Services Website Development Project, Lena Alhusseini

Regis University Student Publications (comprehensive collection)

The development of a website for a non-profit organization concerned with domestic violence is described, including the needs assessment, methodology, implementation, finalization, and evaluation. Gateway Battered Women's Services (GBWS), in Aurora, Colorado, provides shelter, advocacy, and counseling for women and children affected by domestic violence. Its goal is the elimination of personal and societal violence against all women and children through education, support services, and promoting social change within the community. GBWS needed a web presence, a database, and an online counseling service to distribute information on domestic violence to potential clients and volunteers and to solicit donations. A questionnaire …