Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2009

Master's Projects

Articles 1 - 30 of 45

Full-Text Articles in Physical Sciences and Mathematics

Information Flow Model For Commercial Security, Jene Pan Jan 2009

Information Flow Model For Commercial Security, Jene Pan

Master's Projects

Information flow in Discretionary Access Control (DAC) is a well-known difficult problem. This paper formalizes the fundamental concepts and establishes a theory of information flow security. A DAC system is information flow secure (IFS), if any data never flows into the hands of owner’s enemies (explicitly denial access list.)


Hybrid Clustering With Application To Web Pages, Ameya Sabnis Jan 2009

Hybrid Clustering With Application To Web Pages, Ameya Sabnis

Master's Projects

This project explains the process of clustering web pages. With the immense increase in the number of web pages available on the internet, it has become difficult to search for web pages. The clustering of web pages will improve the presentation of web pages to the user and saves the time spent on searching web pages. Various clustering techniques have been proposed by various research scientists to cluster the web pages, but all the techniques suggested have some drawbacks. Since there is lot of scope for further improvement in the field of clustering, the system proposed in this report takes …


Is Four File Chess A Draw?, Michael Karbushev Jan 2009

Is Four File Chess A Draw?, Michael Karbushev

Master's Projects

In this work, we prove that in the game of FOUR FILE Chess, White has at least a Draw. FOUR FILE is a chess variant proposed by John Selfridge, in which only the `a', `c', `e', and `g' les are used. All chess rules are as usual, except that all moves must end on one of these les, and the game starts with the other four les vacant. Here, we prove that the White has at least a draw, by showing that White has a strategy to avoid a loss. We also show that Black can avoid a loss for …


Analysis Of An Openmp Program For Race Detection, Dhaval Shah Jan 2009

Analysis Of An Openmp Program For Race Detection, Dhaval Shah

Master's Projects

The race condition in a shared memory parallel program is subtle and harder to find than in a sequential program. The race conditions cause non-deterministic and unexpected results from the program. It should be avoided in the parallel region of OpenMP programs. The proposed OpenMP Race Avoidance Tool statically analyzes the parallel region. It gives alerts regarding possible data races in that parallel region. The proposed tool has the capability to analyze the basic frequently occurring non-nested ‘for loop(s)’. We are comparing the results of the proposed tool with the commercially available static analysis tool named Intel Parallel Lint and …


Video Conferencing Tool, Sapna Blesson Jan 2009

Video Conferencing Tool, Sapna Blesson

Master's Projects

Video Conferencing Tool (VCT) is a web-based video chat application that allows users anywhere in the world to join real-time streaming video chat rooms. This product is similar to social networking sites that allow web-based video conferencing. The main advantage of VCT compared to existing tools is that it is easy to use and does not require users to download and set up additional hardware. Since this product is a browser-based solution, it allows users from multiple platforms like Windows, Linux, or Mac to join a chat room. My VCT allows users to create new public or private chat rooms …


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol Jan 2009

Triggering Of Just-In-Time Compilation In The Java Virtual Machine, Rouhollah Gougol

Master's Projects

The Java Virtual Machine (Standard Edition) normally interprets Java byte code but also compiles Java methods that are frequently interpreted and runs them natively. The purpose is to take advantage of native execution without having too much overhead for Just-In-Time compilation. A former SJSU thesis tried to enhance the standard policy by predicting frequently called methods ahead of their actual frequent interpretation. The project also tried to increase the compilation throughput by prioritizing the method compilations, if there is more than one hot method to compile at the same time. The paper claimed significant speedup. In this project, we tried …


An Automata Based Text Analysis System, Yue Lu Jan 2009

An Automata Based Text Analysis System, Yue Lu

Master's Projects

This report describes and implements an automata based text analysis system. We have collected some of the writing samples. Each sample establishes a tree, and uses the ALERGIA algorithm to merge all compatible nodes in order to get a merged stochastic finite automaton. We store these automatons which demonstrate writing style of the sample texts in the hard drive. For a new testing piece, we can test if it has similar writing style compared to those sample texts.


Priority Based Routing For Mobile Peer-To-Peer Communications, Swathi Venugopal Jan 2009

Priority Based Routing For Mobile Peer-To-Peer Communications, Swathi Venugopal

Master's Projects

In a Mobile Peer-to-Peer (MP2P) network, mobile nodes share their resources among one another in a mobile wireless environment. Communication among nodes in MP2P network has become an important area for research due to the significance of its applications. The success of these MP2P applications depends on the number of users in the network, popularity of services offered, quick response and faster access to services. Some services offered could be more popular than others and some peers may contribute more to the network by catering to more requests compared to other peers. In priority based routing mechanism, there is an …


Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur Jan 2009

Available Bandwidth Inference Based On Node-Centric Clusters, Seetharam Samptur

Master's Projects

End-to-End Available Bandwidth (AB) is a real-time network metric that is useful for a wide range of applications including content distribution networks, multimedia streaming applications and overlay networks. In a large network with several thousand nodes, it is infeasible to perform all-pair bandwidth measurements as AB measurements could induce traffic overhead along the path. Also because of its dynamic nature, the measurements have to be performed frequently thus imposing significant probe traffic overhead on the network. In this paper, we discuss a clustering based distributed algorithm to infer the AB between any pair of nodes in a large network based …


Client-Side Page Element Web-Caching, Ramya Karri Jan 2009

Client-Side Page Element Web-Caching, Ramya Karri

Master's Projects

When a user explores different web pages in a given website, the website typically sends the entire requested page even if only a portion of the page was different to the current page. That is, two pages on a given website might share elements on the page like search bar, left bar, navigation controls, advertisements, etc., but this information is retransmitted. Most of the users spent their time on the front-end while downloading all the components in the page. Nowadays, server-side caching of page elements is often done using tools like memcached. The aim of my project is to explore …


Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna Jan 2009

Total Recall For Ajax Applications – Firefox Extension, Smita Periyapatna

Master's Projects

Ajax, or AJAX (Asynchronous JavaScript and XML), is a group of interrelated web development techniques used to create interactive web applications or rich Internet applications[9]. Web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of an existing web page. [9] One of the biggest problems with Ajax applications is saving state and accommodating the succession of the history controls, (Back/forward buttons). Ajax allows documents to become stateful, but when the user intuitively goes for the history controls in the browser window, things go wrong. The user expects to see the …


Hunting For Undetectable Metamorphic Viruses, Da Lin Jan 2009

Hunting For Undetectable Metamorphic Viruses, Da Lin

Master's Projects

Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected by a virus or not. To evade signature-based detection, virus writers have adopted code obfuscation techniques to create highly metamorphic computer viruses. Since metamorphic viruses change their appearance from generation to generation, signature-based scanners cannot detect all instances of such viruses. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool based on hidden Markov models (HMMs) was previously developed and the results are encouraging—it has been shown that metamorphic viruses created by a …


Removing The Digital Divide For Senior Web Users, Chiu Luk Jan 2009

Removing The Digital Divide For Senior Web Users, Chiu Luk

Master's Projects

It is hard for the elderly to use the internet to find the resource they want. Usually help is needed for them to complete the task on the technology things. The main reason for this project is to research ideas on encourage senior people to make use of the web to locate helps they want, such as finding volunteers and professional helps. The scope of this project is to develop a new way of web access and content presentation methodologies that let senior people getting help from volunteers and various service providers more easily that incorporates social networking technology e.g. …


Improving Location Determination For Non-Gps Devices, Varun Sud Jan 2009

Improving Location Determination For Non-Gps Devices, Varun Sud

Master's Projects

Location awareness is one of the most important information that an individual looks for, both in an outdoor and indoor environment. One of the primary location determination techniques is the Global Positioning system, though this system provides a good accuracy in an outdoor environment, its accuracy decreases in densely populated areas and in an indoor environment a GPS system ceases to provide location information since the satellite signal cannot permeate through the roof and the walls. Various location estimation techniques have been proposed for location estimation in an indoor environment, some utilizing the signal strength of a wifi transmitter, while …


Priority Based Power Management And Reduced Downtime In Data Centers, Barath Kuppuswamy Jan 2009

Priority Based Power Management And Reduced Downtime In Data Centers, Barath Kuppuswamy

Master's Projects

The project deals successfully with software that performs priority based power management and reduced downtime for virtual machines running in data centers. The software deals with power management only at the processor level. The software automatically performs load distribution among servers in data centers to save power. In addition, the software also lets administrator of data centers to mark certain virtual machines, which run user applications, as critical to minimize downtimes for these virtual machines. The software reveals that energy consumption can be minimized while maintaining high runtime availability for the mission critical applications. The software operates in Green mode …


Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel Jan 2009

Intrusion Alerts Analysis Using Attack Graphs And Clustering, Hardik Patel

Master's Projects

Network and information security is very crucial in keeping large information infrastructures safe and secure. Many researchers have been working on different issues to strengthen and measure security of a network. An important problem is to model security in order to apply analysis schemes efficiently to that model. An attack graph is a tool to model security of a network which considers individual vulnerabilities in a global view where individual hosts are interconnected. The analysis of intrusion alert information is very important for security evaluation of the system. Because of the huge number of alerts raised by intrusion detection systems, …


Web Based Recommender Systems And Rating Prediction, Tho Nguyen Jan 2009

Web Based Recommender Systems And Rating Prediction, Tho Nguyen

Master's Projects

This project implements a recommender system on large dataset of Netflix’s movies. This project also tries to improve recommender systems by incorporating confidence interval and genres of movies. This new approach enhances the performance and quality of service of recommender systems and gives better result than Netflix commercial recommender system, Cinematch.


Knowledge Engineering From Data Perspective: Granular Computing Approach, Rushin Barot Jan 2009

Knowledge Engineering From Data Perspective: Granular Computing Approach, Rushin Barot

Master's Projects

The concept of rough set theory is a mathematical approach to uncertainly and vagueness in data analysis, introduced by Zdzislaw Pawlak in 1980s. Rough set theory assumes the underlying structure of knowledge is a partition. We have extended Pawlak’s concept of knowledge to coverings. We have taken a soft approach regarding any generalized subset as a basic knowledge. We regard a covering as basic knowledge from which the theory of knowledge approximations and learning, knowledge dependency and reduct are developed.


Msg: A Gap-Oriented Genetic Algorithm For Multiple Sequence Alignment, Philip Heller Jan 2009

Msg: A Gap-Oriented Genetic Algorithm For Multiple Sequence Alignment, Philip Heller

Master's Projects

Traditional Multiple Sequence Alignment (MSA) Algorithms are deterministic. Genetic algorithms for protein MSA have been documented. However, these are not able to exceed in all cases the scores obtained by Clustal­W, the freely available de­facto standard. My solution, called “MSG”, places gaps rather than amino acids. The algorithm is multi­tribal, uses only a few very simple operators with adaptive frequencies, and jumpstarts one population from the Clustal­W solution. Results are reported for 14 data sets, on all of which MSG exceeds the Clustal­W score.


Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh Jan 2009

Intrusion Detection And Prevention System: Cgi Attacks, Tejinder Aulakh

Master's Projects

Over the past decade, the popularity of the Internet has been on the rise. The Internet is being used by its clients to access both static and dynamic data residing on remote servers. In the client-server interaction, the client asks the server to provide information, and, in addition, the server may also request that clients provide information such as in “web forms.” Therefore, the Internet is being used for many different purposes which also include the web servers collecting the information from the clients. Consequently, attacks on the web servers have been increasing over the years. Due to the fact …


Heuristic Search Cryptanalysis Of The Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju Jan 2009

Heuristic Search Cryptanalysis Of The Zodiac 340 Cipher, Pallavi Kanagalakatte Basavaraju

Master's Projects

The Zodiac 340 cipher is one of the most famous unsolved ciphers of all time. It was allegedly written by “the Zodiac”, whose identity remains unknown to date. The Zodiac was a serial killer who killed a number of people in and around the San Francisco Bay area during the 1960s. He is confirmed to have seven victims, two of whom survived [1], although in taunting letters to the news media he claims to have killed 37 people. During this time, an encrypted message known as the Zodiac 408 cipher was mailed to 3 different newspapers in the San Francisco …


Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke Jan 2009

Mrcraig: Mapreduce And Ensemble Classifiers For Parallelizing Data Classification Problems, Glenn Jahnke

Master's Projects

In this paper, a novel technique for parallelizing data-classification problems is applied to finding genes in sequences of DNA. The technique involves various ensem- ble classification methods such as Bagging and Select Best. It then distributes the classifier training and prediction using MapReduce. A novel sequence classification voting algorithm is evaluated in the Bagging method, as well as compared against the Select Best method.


Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang Jan 2009

Versatile Extensible Security System For Mobile Ad Hoc Networks, Jung Chang

Master's Projects

Mobile Ad hoc Network (MANET) is becoming more and more popular in scientific, government, and general applications, but security system for MANET is still at infant stage. Currently, there are not many security systems that provide extensive security coverage for MANET. Moreover, most of these security systems assume nodes have infinite computation power and energy; an assumption that is not true for many mobiles. Versatile and Extensible System (VESS) is a powerful and versatile general-purpose security suite that comprises of modified versions of existing encryption and authentication schemes. VESS uses a simple and network-efficient but still reliable authentication scheme. The …


Automatic Video Classification, Don Jayakody Jan 2009

Automatic Video Classification, Don Jayakody

Master's Projects

Within the past few years video usage has grown in a multi-fold fashion. One of the major reasons for this explosive video growth is the rising Internet bandwidth speeds. As of today, a significant human effort is needed to categorize these video data files. A successful automatic video classification method can substantially help to reduce the growing amount of cluttered video data on the Internet. This research project is based on finding a successful model for video classification. We have utilized various schemes of visual and audio data analysis methods to build a successful classification model. As far as the …


World Wide Web – Common Communication Language, Mohamed Ali Jan 2009

World Wide Web – Common Communication Language, Mohamed Ali

Master's Projects

The purpose for the World Wide Web – Common Communication Language (W3-CCL) is to allow internet users around the world communicate using a single common language. This common language is based on images / symbols and other known communication tactics such as Sign Language, Ancient Egyptian Language, etc. The W3- CCL is to be used in building sites’ contents, chatting, sending messages / e-mails, and any information sharing related operations on the internet. The scope of this project is limited to W3-CCL proof of concept via building an e-commerce website for a specific domain; moreover, the W3-CCL usage will be …


Active Lecture: An Interactive Lecturing System, Himavanthara Sajja Jan 2009

Active Lecture: An Interactive Lecturing System, Himavanthara Sajja

Master's Projects

Classroom lecturing has been improving with the advances in information technology. The Active Lecture, an advanced lecturing system, is developed as part of this project. The Active Lecture system allows the students to be more interactive during a lecture process. The Active Lecture system has features that are helpful to both the instructors and the students before, during, and after the lectures. The Active Lecture system is deployed and is made available for use in a classroom. The usage of the Active Lecture system is compared with the usage of Ubiquitous Presenter in a classroom setting.


Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim Jan 2009

Performance Study Of Fmipv6-Based Cross-Layer Wimax Handover Scheme For Supporting Voip Service, Heejung Kim

Master's Projects

This report presents performance study of the FMIPv6-based cross-layer handover scheme for VoIP supports over mobile WiMAX network. For this performance validation and evaluation, the handover delays for four different handover mechanisms are formulated and ns2 based simulation module has been developed. The handover delay, the total delay, and the R factor representing VoIP quality are measured to evaluate the VoIP support characteristics of the FMIPv6-based cross-layer scheme. Simulation results verified that the proposed FMIPv6-based cross-layer handover scheme, compared to the non-cross-layer scheme, successfully reduces total handover delay by almost 50% for the case of layer-3 handover. Further, simulation was …


Common Emotion Modeling In Distinct Medium Analysis And Matching, Amy Cho Jan 2009

Common Emotion Modeling In Distinct Medium Analysis And Matching, Amy Cho

Master's Projects

With the ever growing amount of digital information and multimedia on the World Wide Web and the current trend towards personalizing technology, users find themselves wanting a more intuitive way of finding related information, and not just any information but relevant information that is personal to them. One way to personalize and filter the information is by extracting the mood affectation, allowing the user to search based on current mood. The artificial intelligence field has done extensive research and continues to discover and improve current mood extraction techniques for each distinct medium. This paper will explore how to link and …


Analysis Of Machine Learning Based Methods For Identifying Microrna Precursors, Steve Ikeoka Jan 2009

Analysis Of Machine Learning Based Methods For Identifying Microrna Precursors, Steve Ikeoka

Master's Projects

MicroRNAs are a type of non-coding RNA that were discovered less than a decade ago but are now known to be incredibly important in regulating gene expression despite their small size. However, due to their small size, and several other limiting factors, experimental procedures have had limited success in discovering new microRNAs. Computational methods are therefore vital to discovering novel microRNAs. Many different approaches have been used to scan genomic sequences for novel microRNAs with varying degrees of success. This work provides an overview of these computational methods, focusing particularly on those methods based on machine learning techniques. The results …