Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms

PDF

2011

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 79

Full-Text Articles in Physical Sciences and Mathematics

Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni Dec 2011

Mobile Phone Graph Evolution: Findings, Model And Interpretation, Siyuan Liu, Lei Li, Christos Faloutsos, Lionel M. Ni

LARC Research Publications

What are the features of mobile phone graph along the time? How to model these features? What are the interpretation for the evolutional graph generation process? To answer the above challenging problems, we analyze a massive who-call-whom networks as long as a year, gathered from records of two large mobile phone communication networks both with 2 million users and 2 billion of calls. We examine the calling behavior distribution at multiple time scales (e.g. day, week, month and quarter), and find that the distribution is not only skewed with a heavy tail, but also changing at different time scales. How …


Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee Dec 2011

Identifying Effort Estimation Factors For Corrective Maintenance In Object-Oriented Systems, Michael J. Lee

UNLV Theses, Dissertations, Professional Papers, and Capstones

This research identifies factors that impact software maintenance effort by exploring the decision-making process of expert estimators of corrective maintenance projects by using qualitative methods to identify the factors that they use in deriving estimates. We implement a technique called causal mapping, which allows us to identify the cognitive links between the information that estimators use, and the estimates that they produce based on that information. Results suggest that a total of 17 factors may be relevant for corrective maintenance effort estimation, covering constructs related to developers, code, defects, and environment. When these factors are rank-ordered, they demonstrate that some …


Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell Dec 2011

Quantification Of Stochastic Uncertainty Propagation For Monte Carlo Depletion Methods In Reactor Analysis, Quentin Thomas Newell

UNLV Theses, Dissertations, Professional Papers, and Capstones

The Monte Carlo method provides powerful geometric modeling capabilities for large problem domains in 3-D; therefore, the Monte Carlo method is becoming popular for 3-D fuel depletion analyses to compute quantities of interest in spent nuclear fuel including isotopic compositions. The Monte Carlo approach has not been fully embraced due to unresolved issues concerning the effect of Monte Carlo uncertainties on the predicted results.

Use of the Monte Carlo method to solve the neutron transport equation introduces stochastic uncertainty in the computed fluxes. These fluxes are used to collapse cross sections, estimate power distributions, and deplete the fuel within depletion …


Beyond Search: Event-Driven Summarization For Web Videos, Richard Hong, Jinhui Tang, Hung-Khoon Tan, Chong-Wah Ngo, Shuicheng Yan, Tat-Seng Chua Nov 2011

Beyond Search: Event-Driven Summarization For Web Videos, Richard Hong, Jinhui Tang, Hung-Khoon Tan, Chong-Wah Ngo, Shuicheng Yan, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

The explosive growth of Web videos brings out the challenge of how to efficiently browse hundreds or even thousands of videos at a glance. Given an event-driven query, social media Web sites usually return a large number of videos that are diverse and noisy in a ranking list. Exploring such results will be time-consuming and thus degrades user experience. This article presents a novel scheme that is able to summarize the content of video search results by mining and threading "key" shots, such that users can get an overview of main content of these videos at a glance. The proposed …


Exploring Tweets Normalization And Query Time Sensitivity For Twitter Search, Zhongyu Wei, Wei Gao, Lanjun Zhou, Binyang Li, Kam-Fai Wong Nov 2011

Exploring Tweets Normalization And Query Time Sensitivity For Twitter Search, Zhongyu Wei, Wei Gao, Lanjun Zhou, Binyang Li, Kam-Fai Wong

Research Collection School Of Computing and Information Systems

This paper presents our work for the Realtime Adhoc Task of TREC 2011 Microblog Track. Microblog texts like tweets are generally characterized by the inclusion of a large proportion of irregular expressions, such as ill-formed words, which can lead to significant mismatch between query terms and tweets. In addition, Twitter queries are distinguished from Web queries with many unique characteristics, one of which reflects the clearly distinct temporal aspects of Twitter search behavior. In this study, we deal with the first problem by normalizing tweet texts and the second by capturing the temporal characteristics of topic. We divided topics into …


Advances In Graph-Cut Optimization: Multi-Surface Models, Label Costs, And Hierarchical Costs, Andrew T. Delong Sep 2011

Advances In Graph-Cut Optimization: Multi-Surface Models, Label Costs, And Hierarchical Costs, Andrew T. Delong

Electronic Thesis and Dissertation Repository

Computer vision is full of problems that are elegantly expressed in terms of mathematical optimization, or energy minimization. This is particularly true of "low-level" inference problems such as cleaning up noisy signals, clustering and classifying data, or estimating 3D points from images. Energies let us state each problem as a clear, precise objective function. Minimizing the correct energy would, hypothetically, yield a good solution to the corresponding problem. Unfortunately, even for low-level problems we are confronted by energies that are computationally hard—often NP-hard—to minimize. As a consequence, a rather large portion of computer vision research is dedicated to proposing …


Solving Polynomial Systems Via Triangular Decomposition, Changbo Chen Aug 2011

Solving Polynomial Systems Via Triangular Decomposition, Changbo Chen

Electronic Thesis and Dissertation Repository

Finding the solutions of a polynomial system is a fundamental problem with numerous applications in both the academic and industrial world. In this thesis, we target on computing symbolically both the real and the complex solutions of nonlinear polynomial systems with or without parameters. To this end, we improve existing algorithms for computing triangular decompositions. Based on that, we develop various new tools for solving polynomial systems and illustrate their effectiveness by applications.

We propose new algorithms for computing triangular decompositions of polynomial systems incrementally. With respect to previous works, our improvements are based on a weakened notion of a …


Isomorph-Free Generation Of 2-Connected Graphs With Applications, Derrick Stolee Aug 2011

Isomorph-Free Generation Of 2-Connected Graphs With Applications, Derrick Stolee

CSE Technical Reports

Many interesting graph families contain only 2-connected graphs, which have ear decompositions. We develop a technique to generate families of unlabeled 2-connected graphs using ear augmentations and apply this technique to two problems. In the first application, we search for uniquely Kr-saturated graphs and find the list of uniquely K4-saturated graphs on at most 12 vertices, supporting current conjectures for this problem. In the second application, we verify the Edge Reconstruction Conjecture for all 2-connected graphs on at most 12 vertices. This technique can be easily extended to more problems concerning 2-connected graphs.


Some Single And Combined Operations On Formal Languages: Algebraic Properties And Complexity, Bo Cui Aug 2011

Some Single And Combined Operations On Formal Languages: Algebraic Properties And Complexity, Bo Cui

Electronic Thesis and Dissertation Repository

In this thesis, we consider several research questions related to language operations in the following areas of automata and formal language theory: reversibility of operations, generalizations of (comma-free) codes, generalizations of basic operations, language equations, and state complexity.

Motivated by cryptography applications, we investigate several reversibility questions with respect to the parallel insertion and deletion operations. Among the results we obtained, the following result is of particular interest. For languages L1, L2Σ, if L2 satisfies the condition L2ΣL2 ∩ Σ+L2Σ+ = ∅, then …


Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb Aug 2011

Workflow-Net Based Cooperative Multi-Agent Systems, Yehia T. Kotb

Electronic Thesis and Dissertation Repository

Workflow-nets are mathematical frameworks that are used to formally describe, model and implement workflows. First, we propose critical section workflow nets (abbreviated WFCSnet). This framework allows feedbacks in workflow systems while ensuring the soundness of the workflow. Feedback is generally not recommended in workflow systems as they threaten the soundness of the system. The proposed WFCSnet allows safe feedback and limits the maximum number of activities per workflow as required. A theorem for soundness of WFCSnet is presented. Serializability, Separability, Quasi-liveness and CS-Properties of WFCSnet are examined and some theorems and lemmas are proposed to mathematically formalize them. In this …


Transcriptomic Data Analysis Using Graph-Based Out-Of-Core Methods, Gary L Rogers Aug 2011

Transcriptomic Data Analysis Using Graph-Based Out-Of-Core Methods, Gary L Rogers

Doctoral Dissertations

Biological data derived from high-throughput microarrays can be transformed into finite, simple, undirected graphs and analyzed using tools first introduced by the Langston Lab at the University of Tennessee. Transforming raw data can be broken down into three main tasks: data normalization, generation of similarity metrics, and threshold selection. The choice of methods used in each of these steps effect the final outcome of the graph, with respect to size, density, and structure. A number of different algorithms are examined and analyzed to illustrate the magnitude of the effects.

Graph-based tools are then used to extract putative gene networks. These …


A Geospatial Based Decision Framework For Extending Marssim Regulatory Principles Into The Subsurface, Robert Nathan Stewart Aug 2011

A Geospatial Based Decision Framework For Extending Marssim Regulatory Principles Into The Subsurface, Robert Nathan Stewart

Doctoral Dissertations

The Multi-Agency Radiological Site Survey Investigation Manual (MARSSIM) is a regulatory guidance document regarding compliance evaluation of radiologically contaminated soils and buildings (USNRC, 2000). Compliance is determined by comparing radiological measurements to established limits using a combination of hypothesis testing and scanning measurements. Scanning allows investigators to identify localized pockets of contamination missed during sampling and allows investigators to assess radiological exposure at different spatial scales. Scale is important in radiological dose assessment as regulatory limits can vary with the size of the contaminated area and sites are often evaluated at more than one scale (USNRC, 2000). Unfortunately, scanning is …


Roaming Region For Delaunay Triangulation, Romas James Hada Aug 2011

Roaming Region For Delaunay Triangulation, Romas James Hada

UNLV Theses, Dissertations, Professional Papers, and Capstones

Delaunay graphs have been used in CAD/CAM, sensor network and geographic information systems. We investigate the reliability properties of nodes in Delaunay graphs. For measuring the reliability we formulate the concept of roaming-region for nodes. A node v with large roaming-region r(v) such that v is positioned near the center of r(v) is identified as a reliable node. We develop algorithms for constructing roaming-regions and present an implementation of the proposed algorithm in the Java programming language.


Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak Aug 2011

Improved Algorithms For Ear-Clipping Triangulation, Bartosz Kajak

UNLV Theses, Dissertations, Professional Papers, and Capstones

We consider the problem of improving ear-slicing algorithm for triangulating a simple polygon. We propose two variations of ear-slicing technique for generating “good-quality” triangulation. The first approach is based on searching for the best triangle along the boundary. The second approach considers polygon partitioning on a pre-process before applying the ear-slicing. Experimental investigation reveals that both approaches yield better quality triangulation than the standard ear-slicing method.


Structure And Randomness Of The Discrete Lambert Map, Jingjing Chen, Mark Lotts Jul 2011

Structure And Randomness Of The Discrete Lambert Map, Jingjing Chen, Mark Lotts

Mathematical Sciences Technical Reports (MSTR)

We investigate the structure and cryptographic applications of the Discrete Lambert Map (DLM). The mapping is closely related to the Discrete Log Problem, but has received far less attention since it is considered to be a more complicated map that is likely even harder to invert. However, this mapping is quite important because it underlies the security of the ElGamal Digital Signature Scheme. Using functional graphs induced by this mapping, we were able to find non-random properties that could potentially be used to exploit the ElGamal DSS.


The Square Discrete Exponentiation Map, A Wood Jul 2011

The Square Discrete Exponentiation Map, A Wood

Mathematical Sciences Technical Reports (MSTR)

We will examine the square discrete exponentiation map and its properties. The square discrete exponentiation map is a variation on a commonly seen problem in cryptographic algorithms. This paper focuses on understanding the underlying structure of the functional graphs generated by this map. Specifically, this paper focuses on explaining the in-degree of graphs of safe primes, which are primes of the form p = 2q + 1, where q is also prime.


Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen Jul 2011

Image Processing – I: Pointing And Target Selection Of Object Using Color Detection Algorithm Through Dsp Processor Tms320c6711, Waseem Ahmed, M. Irfan, Mr. Muzammil, Mr. Yaseen

International Conference on Information and Communication Technologies

In the field of robotic and image vision technologies, the embedded computing and optimization of the image processing algorithm is quite significant in order to provide the real time processing. In the current era, for making the real time system for such high extensive computation and processing for providing the high speed and real time standalone system, several industrial giants continuously providing the solutions which are in the form of dedicated DSP processors and generalized FPGAs. Beside such high speed processor implementation, the image processing based algorithm plays significant role in machine vision based solution for industries, robotic and field …


Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia Jul 2011

Network Security: Privacy-Preserving Data Publication: A Review On “Updates” In Continuous Data Publication, Adeel Anjum, Guillaume Raschia

International Conference on Information and Communication Technologies

Preserving the privacy of individuals while publishing their relevant data has been an important problem. Most of previous works in privacy preserving data publication focus on one time, static release of datasets. In multiple publications however, where data is published multiple times, these techniques are unable to ensure privacy of the concerned individuals as just joining either of the releases could result in identity disclosure. In this work, we tried to investigate the major findings in the scenario of continuous data publication, in which the data is not only published multiple times but also modified with INSERTS, UPDATES and DELETE …


Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid Jul 2011

Image Processing – I: Automated System For Fingerprint Image Enhancement Using Improved Segmentation And Gabor Wavelets, Amna Saeed, Anam Tariq, Usman Jawaid

International Conference on Information and Communication Technologies

This research revolves around the fingerprint image enhancement. It is used for automated fingerprint identification systems (AFIS) for extracting the best quality fingerprint images. Accurate feature extraction and identification is the basic theme of this enhancement. This paper is on the fingerprint image enhancement using wavelets. Wavelets are famous for their special localization property and orientation flow estimation. The proposed technique is basically comprises of three main steps: segmentation followed by image sharpening and then Gabor wavelet filtering. Segmentation distinguishes between image background and foreground which in turn reduces processing time. Our sharpening stage of enhancement algorithm sharpens the edges …


Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig Jul 2011

Application Of Ict: Fram Based Tmr (Triple Modular Redundancy) For Fault Tolerance Implementation, Kashif Sagheer Siddiqui, Mirza Altamash Baig

International Conference on Information and Communication Technologies

The main objective of this paper is to design a Triple modular redundancy test bench using FRAM (Ferroelectric RAM) based memory module for main driver of OBDH (On Board Data Handling) system of LEO (Lower Earth Orbit) Satellite that enables the fast detection of error in driver data when implied with FPGA (Field Programmable Gate Array) and provides more realistic and tolerant way of fault finding for Single Event Upset (SEU) in highly radiated space environment. The scope of paper embraces development of TMR test bench, software algorithms, functional simulations, timing simulations and conclusion of comparison of FRAM based memory …


Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood Jul 2011

Artificial Intelligence - I: Adaptive Automated Teller Machines - Part Ii, Ghulam Mujtaba, Tariq Mahmood

International Conference on Information and Communication Technologies

Nowadays, the banking sector is increasingly relying on Automated Teller Machines (ATMs) in order to provide services to its customers. Although thousands of ATMs exist across many banks and different locations, the GUI and content of a typical ATM interface remains, more or less, the same. For instance, any ATM provides typical options for withdrawal, electronic funds transfer, viewing of mini-statements etc. However, such a static interface might not be suitable for all ATM customers, e.g., some users might not prefer to view all the options when they access the ATM, or to view specific withdrawal amounts less than, say, …


Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jul 2011

Heuristic Algorithms For Balanced Multi-Way Number Partitioning, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Balanced multi-way number partitioning (BMNP) seeks to split a collection of numbers into subsets with (roughly) the same cardinality and subset sum. The problem is NP-hard, and there are several exact and approximate algorithms for it. However, existing exact algorithms solve only the simpler, balanced two-way number partitioning variant, whereas the most effective approximate algorithm, BLDM, may produce widely varying subset sums. In this paper, we introduce the LRM algorithm that lowers the expected spread in subset sums to one third that of BLDM for uniformly distributed numbers and odd subset cardinalities. We also propose Meld, a novel strategy for …


Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel Jul 2011

Automatic Content Generation For Video Self Modeling, Ju Shen, Anusha Raghunathan, Sen-Ching S. Cheung, Ravi R. Patel

Computer Science Faculty Publications

Video self modeling (VSM) is a behavioral intervention technique in which a learner models a target behavior by watching a video of him or herself. Its effectiveness in rehabilitation and education has been repeatedly demonstrated but technical challenges remain in creating video contents that depict previously unseen behaviors. In this paper, we propose a novel system that re-renders new talking-head sequences suitable to be used for VSM treatment of patients with voice disorder. After the raw footage is captured, a new speech track is either synthesized using text-to-speech or selected based on voice similarity from a database of clean speeches. …


Online Auc Maximization, Peilin Zhao, Steven C. H. Hoi, Rong Jin, Tianbo Yang Jul 2011

Online Auc Maximization, Peilin Zhao, Steven C. H. Hoi, Rong Jin, Tianbo Yang

Research Collection School Of Computing and Information Systems

Most studies of online learning measure the performance of a learner by classification accuracy, which is inappropriate for applications where the data are unevenly distributed among different classes. We address this limitation by developing online learning algorithm for maximizing Area Under the ROC curve (AUC), a metric that is widely used for measuring the classification performance for imbalanced data distributions. The key challenge of online AUC maximization is that it needs to optimize the pairwise loss between two instances from different classes. This is in contrast to the classical setup of online learning where the overall loss is a sum …


Algorithms Analysis System: Recurrences, Anchit Sharma Jul 2011

Algorithms Analysis System: Recurrences, Anchit Sharma

Master's Projects

Algorithms which are recursive have running times which can be described by

recurrence equations or recurrences. These equations determine the overall running time complexity of the algorithm. This project intends to create a mechanism for

  • auto generating recurrence equations of the form T(n) = a(T(n)/b) + f(n)

  • creating a computational method for solving them and generating running times

    i.e. O (f(n)) or Ω (f(n)).

  • presenting students with a way to verify their manually computed answers with

    the solution generation by the project

  • generating grading and feedback for their solution

    The exercises will utilize the ‘Substitution Method’ and the ‘Master Method’ …


Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier Jun 2011

Estimating Anthropometric Marker Locations From 3-D Ladar Point Clouds, Matthew J. Maier

Theses and Dissertations

An area of interest for improving the identification portion of the system is in extracting anthropometric markers from a Laser Detection and Ranging (LADAR) point cloud. Analyzing anthropometrics markers is a common means of studying how a human moves and has been shown to provide good results in determining certain demographic information about the subject. This research examines a marker extraction method utilizing principal component analysis (PCA), self-organizing maps (SOM), alpha hulls, and basic anthropometric knowledge. The performance of the extraction algorithm is tested by performing gender classification with the calculated markers.


Applications Of Local Fractional Calculus To Engineering In Fractal Time-Space: Local Fractional Differential Equations With Local Fractional Derivative, Yang Xiao-Jun Jun 2011

Applications Of Local Fractional Calculus To Engineering In Fractal Time-Space: Local Fractional Differential Equations With Local Fractional Derivative, Yang Xiao-Jun

Xiao-Jun Yang

This paper presents a better approach to model an engineering problem in fractal-time space based on local fractional calculus. Some examples are given to elucidate to establish governing equations with local fractional derivative.


A Short Introduction To Local Fractional Complex Analysis, Yang Xiao-Jun Jun 2011

A Short Introduction To Local Fractional Complex Analysis, Yang Xiao-Jun

Xiao-Jun Yang

This paper presents a short introduction to local fractional complex analysis. The generalized local fractional complex integral formulas, Yang-Taylor series and local fractional Laurent’s series of complex functions in complex fractal space, and generalized residue theorems are investigated.


Fractional Trigonometric Functions In Complex-Valued Space: Applications Of Complex Number To Local Fractional Calculus Of Complex Function, Yang Xiao-Jun Jun 2011

Fractional Trigonometric Functions In Complex-Valued Space: Applications Of Complex Number To Local Fractional Calculus Of Complex Function, Yang Xiao-Jun

Xiao-Jun Yang

This paper presents the fractional trigonometric functions in complex-valued space and proposes a short outline of local fractional calculus of complex function in fractal spaces.


A New Viewpoint To The Discrete Approximation: Discrete Yang-Fourier Transforms Of Discrete-Time Fractal Signal, Yang Xiao-Jun Jun 2011

A New Viewpoint To The Discrete Approximation: Discrete Yang-Fourier Transforms Of Discrete-Time Fractal Signal, Yang Xiao-Jun

Xiao-Jun Yang

It is suggest that a new fractal model for the Yang-Fourier transforms of discrete approximation based on local fractional calculus and the Discrete Yang-Fourier transforms are investigated in detail.